LogMePwnA fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.
Stars: ✭ 362 (+761.9%)
Grinder🔎 Python framework to automatically discover and enumerate hosts from different back-end systems (Shodan, Censys)
Stars: ✭ 209 (+397.62%)
vminspectTools for inspecting disk images
Stars: ✭ 25 (-40.48%)
PyIrisPyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (+604.76%)
PatrowlenginesPatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform
Stars: ✭ 162 (+285.71%)
ospdOSPd is a framework for vulnerability scanners which share the same communication protocol: OSP (Open Scanner Protocol)
Stars: ✭ 32 (-23.81%)
AryAry 是一个集成类工具,主要用于调用各种安全工具,从而形成便捷的一键式渗透。
Stars: ✭ 241 (+473.81%)
BinV👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.
Stars: ✭ 25 (-40.48%)
ShodanwaveShodanwave is a tool for exploring and obtaining information from Netwave IP Camera.
Stars: ✭ 183 (+335.71%)
magicReconMagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.
Stars: ✭ 478 (+1038.1%)
k8s-harborHarbor in Kubernetes
Stars: ✭ 36 (-14.29%)
GvmdGreenbone Vulnerability Manager
Stars: ✭ 140 (+233.33%)
dr checker 4 linuxPort of "DR.CHECKER : A Soundy Vulnerability Detection Tool for Linux Kernel Drivers" to Clang/LLVM 10 and Linux Kernel
Stars: ✭ 34 (-19.05%)
dep-scanFully open-source security audit for project dependencies based on known vulnerabilities and advisories. Supports both local repos and container images. Integrates with various CI environments such as Azure Pipelines, CircleCI and Google CloudBuild. No server required!
Stars: ✭ 346 (+723.81%)
Dr checkerDR.CHECKER : A Soundy Vulnerability Detection Tool for Linux Kernel Drivers
Stars: ✭ 251 (+497.62%)
scan-cli-pluginDocker Scan is a Command Line Interface to run vulnerability detection on your Dockerfiles and Docker images
Stars: ✭ 135 (+221.43%)
Sec Admin分布式资产安全扫描核心管理系统(弱口令扫描,漏洞扫描)
Stars: ✭ 222 (+428.57%)
crawleetWeb Recon & Exploitation Tool.
Stars: ✭ 48 (+14.29%)
VulnfanaticA Binary Ninja plugin for vulnerability research.
Stars: ✭ 203 (+383.33%)
NETNOOBA simple program written in bash that contains basic Linux network tools, information gathering tools and scanning tools.
Stars: ✭ 105 (+150%)
Nginx Ultimate Bad Bot BlockerNginx Block Bad Bots, Spam Referrer Blocker, Vulnerability Scanners, User-Agents, Malware, Adware, Ransomware, Malicious Sites, with anti-DDOS, Wordpress Theme Detector Blocking and Fail2Ban Jail for Repeat Offenders
Stars: ✭ 2,351 (+5497.62%)
iskanKubernetes Native, Runtime Container Image Scanning
Stars: ✭ 35 (-16.67%)
Burp Molly ScannerTurn your Burp suite into headless active web application vulnerability scanner
Stars: ✭ 146 (+247.62%)
vulnscanA static binary vulnerability scanner
Stars: ✭ 47 (+11.9%)
aparoidStatic and dynamic Android application security analysis
Stars: ✭ 62 (+47.62%)
SdwannewhopeSD-WAN security and insecurity
Stars: ✭ 141 (+235.71%)
FSEC-VMBackend logic implementation for Vulnerability Management System
Stars: ✭ 19 (-54.76%)
Gr33k图形化漏洞利用集成工具
Stars: ✭ 361 (+759.52%)
octovyTrivy based vulnerability management service
Stars: ✭ 51 (+21.43%)
inthewilddbHourly updated database of exploit and exploitation reports
Stars: ✭ 127 (+202.38%)
InsectsawakeNetwork Vulnerability Scanner
Stars: ✭ 252 (+500%)
AttackSurfaceManagementDiscover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (+7.14%)
RedTeam toolkitRed Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together.
Stars: ✭ 301 (+616.67%)
ProgpilotA static analysis tool for security
Stars: ✭ 226 (+438.1%)
Angularjs Csti ScannerAutomated client-side template injection (sandbox escape/bypass) detection for AngularJS.
Stars: ✭ 214 (+409.52%)
Log4j-RCE-ScannerRemote command execution vulnerability scanner for Log4j.
Stars: ✭ 200 (+376.19%)
EnumyLinux post exploitation privilege escalation enumeration
Stars: ✭ 210 (+400%)
ochrona-cliA command line tool for detecting vulnerabilities in Python dependencies and doing safe package installs
Stars: ✭ 46 (+9.52%)
Sbt Dependency CheckSBT Plugin for OWASP DependencyCheck. Monitor your dependencies and report if there are any publicly known vulnerabilities (e.g. CVEs). 🌈
Stars: ✭ 187 (+345.24%)
DouBanReptile豆瓣租房小组多线程爬虫。爬取后自动按时间排序生成markdown文件。
Stars: ✭ 31 (-26.19%)
Rebel FrameworkAdvanced and easy to use penetration testing framework 💣🔎
Stars: ✭ 183 (+335.71%)
MixewayScannerMixeway Scanner is Spring Boot application which aggregate integration with number of OpenSource Vulnerability scanners - both SAST and DAST types
Stars: ✭ 15 (-64.29%)
VulscanAdvanced vulnerability scanning with Nmap NSE
Stars: ✭ 2,305 (+5388.1%)
Zeebsploitweb scanner - exploitation - information gathering
Stars: ✭ 159 (+278.57%)
Jira-LensFast and customizable vulnerability scanner For JIRA written in Python
Stars: ✭ 185 (+340.48%)
DetexploitOSS Vulnerability Scanner for Windows Platform
Stars: ✭ 146 (+247.62%)
vulnerablecodeA free and open vulnerabilities database and the packages they impact. And the tools to aggregate and correlate these vulnerabilities. Sponsored by NLnet https://nlnet.nl/project/vulnerabilitydatabase/ for https://www.aboutcode.org/ Chat at https://gitter.im/aboutcode-org/vulnerablecode Docs at https://vulnerablecode.readthedocs.org/
Stars: ✭ 269 (+540.48%)
ScoutScout - a Contactless Active Reconnaissance Tool
Stars: ✭ 48 (+14.29%)
klustair(Deprecated) Submit all images in your Kubernetes cluster to Anchore for a vulnerability check and check your configuration with kubeaudit
Stars: ✭ 15 (-64.29%)
log4shelldetectRapidly scan filesystems for Java programs potentially vulnerable to Log4Shell (CVE-2021-44228) or "that Log4j JNDI exploit" by inspecting the class paths inside files
Stars: ✭ 40 (-4.76%)
TORhunterDesigned to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .onion
Stars: ✭ 47 (+11.9%)
PinaakA vulnerability fuzzing tool written in bash, it contains the most commonly used tools to perform vulnerability scan
Stars: ✭ 69 (+64.29%)