👋 Hi, I’m Steve Campbell, aka @lpha3ch0.
👀 I’m interested in application security, pentesting, and bug bounties.
📫 How to reach me:
👋 Hi, I’m Steve Campbell, aka @lpha3ch0.
👀 I’m interested in application security, pentesting, and bug bounties.
📫 How to reach me:
Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automation pipeline.
Expands a pentest scope by taking an input list which includes IP addresses and parses DNS and TLS SAN hostnames and merges the results with the original scope list.
Go 1
This tool enriches domain lists by resolving each domain to its IP address and identifying the organization that owns the IP block. This helps you determine which domains are actually in scope for …
Bash Shell Scripting for Pentesters, published by Packt
Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv