Showing 53 open source projects for "xml mapping tool"

View related business solutions
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 1
    OWASP Amass

    OWASP Amass

    In-depth attack surface mapping and asset discovery

    The OWASP Amass Project has developed a tool to help information security professionals perform network mapping of attack surfaces and perform external asset discovery using open source information gathering and active reconnaissance techniques. The Open Web Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software. All of our projects ,tools, documents, forums, and chapters are free and open to anyone interested in improving application security. ...
    Downloads: 22 This Week
    Last Update:
    See Project
  • 2
    Scope Sentry

    Scope Sentry

    Cyberspace asset mapping and vulnerability scanning platform

    ScopeSentry is an open source cybersecurity tool designed for cyberspace asset mapping and automated security analysis. It helps security researchers and penetration testers discover, monitor, and analyze internet-facing assets belonging to a target scope. ScopeSentry combines multiple reconnaissance and vulnerability assessment capabilities such as subdomain enumeration, port scanning, directory scanning, and sensitive information detection.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    subfinder

    subfinder

    Fast passive subdomain enumeration tool

    Subfinder is a high-performance passive subdomain discovery tool built for fast and reliable asset enumeration. It focuses exclusively on collecting valid subdomains from a wide range of passive online sources, prioritizing accuracy and speed over intrusive scanning techniques. The project is widely used in bug bounty hunting, penetration testing, and attack surface mapping because it minimizes noise while producing actionable results.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 4
    holehe

    holehe

    Check if the mail is used on different sites

    ...The project can be used both as a standalone command-line tool and as a library embedded into larger automation pipelines. Overall, holehe provides investigators with a focused and scalable method for mapping an email’s online presence.
    Downloads: 12 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 5
    ASNmap

    ASNmap

    CLI tool for mapping organization network ranges using ASN data

    asnmap is a command line tool and Go library designed to quickly map network ranges belonging to organizations using Autonomous System Number (ASN) data. It allows users to convert different types of inputs (such as ASN numbers, IP addresses, domain names, or organization names) into their associated CIDR ranges. This capability makes it particularly useful for security researchers, penetration testers, and reconnaissance workflows that require identifying network infrastructure owned by a...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    XRAY

    XRAY

    XRay for recon, mapping and OSINT gathering from public networks

    XRAY is a modular security toolset that helps developers and security professionals analyze, fuzz, and test web applications, protocols, and network services for vulnerabilities. It provides a framework for writing and executing inspection modules that can parse structured data (JSON, XML, HTML), traverse graphs of endpoints, and perform intelligent probing guided by discovered surface area. XRay is typically used as a reconnaissance and vulnerability discovery engine in red-team or...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Social-Analyzer

    Social-Analyzer

    API, CLI, and Web App for analyzing and finding a person's profile

    ...Social Analyzer emphasizes flexibility, allowing integration into automated pipelines or manual investigations. Overall, the project functions as a powerful reconnaissance engine for mapping online identities at scale.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 8
    RedAmon

    RedAmon

    AI-powered framework for automated penetration testing and red teaming

    RedAmon is an AI-powered red team framework designed to automate offensive cybersecurity operations from reconnaissance to exploitation and post-exploitation. It combines artificial intelligence with traditional penetration testing tools to create a fully autonomous pipeline capable of discovering vulnerabilities and executing security assessments without human intervention. It begins with a multi-phase reconnaissance engine that maps the entire attack surface of a target, collecting...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 9
    Metabigor

    Metabigor

    Command-line OSINT and reconnaissance tool without API keys

    Metabigor is a command-line intelligence and OSINT tool designed to perform reconnaissance and security research tasks without requiring API keys. It focuses on simplifying access to public intelligence sources so that researchers, penetration testers, and bug bounty hunters can gather information efficiently from a single interface. It enables users to discover IP ranges, domains, and infrastructure details related to organizations, domains, or autonomous systems. Metabigor integrates...
    Downloads: 1 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 10
    Flan Scan

    Flan Scan

    A pretty sweet vulnerability scanner

    Flan Scan is a lightweight open-source network vulnerability scanner designed to make it easy to detect exposed services, open ports, and associated vulnerabilities across IP ranges or network segments as part of security audit and compliance workflows. It is essentially a thin wrapper around the widely-used Nmap scanner, augmenting it with scripts and tooling that transform raw Nmap output into vulnerability-focused reports that map detected services to known CVEs, making results more...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    Netdisco

    Full-featured enterprise network management tool

    Netdisco is an SNMP-based L2/L3 network management tool designed for moderate to large networks. Routers and switches are polled to log IP and MAC addresses and map them to switch ports. Automatic L2 network topology discovery, display, and inventory.
    Downloads: 37 This Week
    Last Update:
    See Project
  • 12
    Anya

    Anya

    A malware analysis platform built in Rust

    Anya is a privacy-first static malware analysis tool for Windows, Linux, and macOS. It combines PE, ELF, and Mach-O binary analysis with MITRE ATT&CK mapping, confidence-based risk scoring, and plain-English explanations. All offline, with zero network calls. Built for analysts and students alike, it ships as both a CLI and a desktop GUI.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 13
    dirsearch

    dirsearch

    Web path scanner

    An advanced command-line tool designed to brute force directories and files in webservers, AKA web path scanner. Wordlist is a text file, each line is a path. About extensions, unlike other tools, dirsearch only replaces the %EXT% keyword with extensions from -e flag. For wordlists without %EXT% (like SecLists), -f | --force-extensions switch is required to append extensions to every word in wordlist, as well as the /. To use multiple wordlists, you can separate your wordlists with commas....
    Downloads: 17 This Week
    Last Update:
    See Project
  • 14
    Password Extractor

    Password Extractor

    Transfer passwords to and from K-Meleon

    ...This extension for K-Meleon can also be installed on other browsers that use XUL including SeaMonkey, Pale Moon, Mypal, Roytam's New Moon, and Waterfox Classic. The Password Extractor XML export/import format is also used by Password Exporter (for Firefox and SeaMonkey) and Password Backup Tool (for Pale Moon and Basilisk). The CSV export format is compatible with popular browsers and password managers including Mozilla Firefox, Google Chrome, Microsoft Edge, Opera, Brave, Vivaldi, KeePass, and KeePassXC. To import passwords from another browser's CSV password export use the Password Extractor conversion tool for your browser.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 15
    DNSGen

    DNSGen

    Intelligent DNS permutation tool for subdomain discovery

    DNSGen is an open source DNS name permutation tool designed primarily for security researchers and penetration testers who need to discover potential subdomains during reconnaissance and attack surface mapping. It analyzes existing domain names and generates numerous intelligent variations that may represent valid subdomains within an organization’s infrastructure. These generated permutations help identify hidden or unlisted services that may not appear in standard DNS queries or public records. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    AttackSurfaceMapper

    AttackSurfaceMapper

    Automated tool for mapping & expanding organization’s attack surface

    AttackSurfaceMapper (ASM) is a reconnaissance and attack surface discovery tool designed to automate the process of mapping potential targets within an organization's infrastructure. It combines open source intelligence (OSINT) with selective active reconnaissance techniques to expand and analyze a target’s external attack surface. Users can supply domains, subdomains, or IP addresses as input, and applies multiple discovery methods to identify additional related assets such as new subdomains, associated IP ranges, and hosts within the same network ownership. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    iWatch is a realtime filesystem monitoring program. It is a tool for detecting changes in filesystem and reporting it immediately.It uses a simple config file in XML format and is based on inotify, a file change notification system in the Linux kernel.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Photon

    Photon

    Incredibly fast crawler designed for OSINT

    ...It is designed to extract URLs, endpoints, files, and other intelligence artifacts from target websites with minimal overhead. The crawler prioritizes speed and breadth, making it suitable for mapping web attack surfaces and discovering hidden resources. Photon is commonly used during early reconnaissance phases to build a comprehensive inventory of reachable assets. Its Python implementation makes it accessible for customization and integration into larger automation frameworks. Despite its speed focus, the tool still provides useful filtering and extraction capabilities for analysts who need structured results. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 19
    ISeeYou

    ISeeYou

    Location tracking tool for social engineering and phishing tests

    I-See-You is an open source Bash and JavaScript tool designed to capture the geographic location of a target during social engineering or phishing engagements. It works by generating a link that can be sent to a target as part of a phishing scenario, where the webpage requests permission to access the user’s location. When the user allows location access, I-See-You records the latitude and longitude coordinates and displays them in the terminal logs for the operator.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Xenos

    Xenos

    Windows dll injector

    Xenos is a lightweight Windows DLL injector built on top of the Blackbone library that specializes in injecting custom dynamic libraries into target processes for purposes such as modding, testing, or security research. As an application rather than a library, it provides a concrete example of how to leverage Blackbone’s robust process and memory manipulation APIs to perform manual and automated DLL injection into both 32-bit and 64-bit Windows applications. Xenos supports a variety of...
    Downloads: 251 This Week
    Last Update:
    See Project
  • 21
    Scandiff is a tool used to find the differences between two nmap scan logs and display results to the user. Scandiff detects changes in port status, operating system, scantime, nmap version, and more. Supports nmap grepable and XML output formats
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    must: A More Useful Syslog Test tool

    A syslog message generator that replicates real syslog messages

    ...must was created to fill a gap found when trying to stress test Splunk as real, indexable and meaningful data was needed. must will (eventually) be provided as a standalone tool that uses XML configs (for quick use and consultancy etc) and as a web-based tool (for more permanent/pretty deployment (with historical reporting and live stats). SUPPORT: The best way of contacting me is via Twitter below, NEWS: (16/Mar/15) A beta of v2 is finally released - apologies for the long delay!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    dream-cms

    Free and Open Source Web Sites Builder

    Everything for the real website DreamCMS is open and completely free web application for the construction websites of any complexity. We will provide you with all the self-creation of the site without any special knowledges, and html. Never before web development was not so simple. In your hands will be a modern, convenient and simple tool: a free online business card, online shop or the official website of the company. Focus on your business. We will do everything else. And all this is...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    PerlSCAP

    Perl implementation of a SCAP benchmark tool

    Interprets XCCDF checklists referencing OVAL machine checks and uses them to determine a machine's benchmark state. A XCCDF results file is generated as output.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    This tool can create XAdES (XML) signatures based upon ETSI TS 101 903 v1.3.2 standard. It also includes handling of ITU-T X.509 certificates and RFC 3161 timestamps.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next
MongoDB Logo MongoDB