Many hyperlinks are disabled.
Use anonymous login
to enable hyperlinks.
History for Parse-nmap-XML-output.ps1
2018-06-10
| ||
12:56 | Added: A PowerShell script into which one or more nmap XML output file objects can be piped, then the script emits synthetic objects representing port-scanned hosts from the XML file(s). Get Windows and Linux versions of the nmap scanner for free from http://nmap.org. Get a sample nmap XML file to play with and see some examples of using the script at https://blogs.sans.org/windows-security/2009/06/11/powershell-script-to-parse-nmap-xml-output/ file: [c527f557cd] check-in: [f00f82240f] user: Jason Fossen branch: trunk, size: 5555 | |