Hi there,
I was playing with one of the example nmap scripts a couple of weeks ago, and I noticed that the script would fail for sites that seemingly should have passed if you'd run the nmap command directly.
After looking a little closer, I realized that nmap spaces its output differently depending on what it finds for the list of ports that return results (specifically, "open", "closed", and "filtered". The attack rules I had before had literal whitespace defined, so those wouldn't always match when they should. With a little regexing I could build some better checks...what regex support does gauntlt provide today? Thanks in advance.
-Steve H