All Projects → Nerve → Similar Projects or Alternatives

600 Open source projects that are alternatives of or similar to Nerve

Intrigue Ident
Application and Service Fingerprinting
Stars: ✭ 70 (-73.78%)
Progpilot
A static analysis tool for security
Stars: ✭ 226 (-15.36%)
OpenVAS-Docker
A Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)
Stars: ✭ 16 (-94.01%)
scan-cli-plugin
Docker Scan is a Command Line Interface to run vulnerability detection on your Dockerfiles and Docker images
Stars: ✭ 135 (-49.44%)
Libdiffuzz
Custom memory allocator that helps discover reads from uninitialized memory
Stars: ✭ 147 (-44.94%)
Mutual labels:  security-tools, security-testing
Apk Medit
memory search and patch tool on debuggable apk without root & ndk
Stars: ✭ 189 (-29.21%)
Mutual labels:  security-tools, security-testing
Safety
Safety checks your installed dependencies for known security vulnerabilities
Stars: ✭ 982 (+267.79%)
Secretscanner
Find secrets and passwords in container images and file systems
Stars: ✭ 895 (+235.21%)
Honggfuzz Rs
Fuzz your Rust code with Google-developed Honggfuzz !
Stars: ✭ 222 (-16.85%)
Mutual labels:  security-tools, security-testing
Awesome Java Security
Awesome Java Security Resources 🕶☕🔐
Stars: ✭ 216 (-19.1%)
Mutual labels:  security-tools, security-testing
Salt Scanner
Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration
Stars: ✭ 261 (-2.25%)
ochrona-cli
A command line tool for detecting vulnerabilities in Python dependencies and doing safe package installs
Stars: ✭ 46 (-82.77%)
Mutual labels:  vulnerability-scanners
dependency-check-py
🔐 Shim to easily install OWASP dependency-check-cli into Python projects
Stars: ✭ 44 (-83.52%)
Mutual labels:  vulnerability-detection
apkutil
a useful utility for android app security testing
Stars: ✭ 52 (-80.52%)
Mutual labels:  security-testing
vulnerability-db
Vulnerability database and package search for sources such as OSV, NVD, GitHub and npm.
Stars: ✭ 36 (-86.52%)
Mutual labels:  vulnerability-detection
ShonyDanza
A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
Stars: ✭ 86 (-67.79%)
Mutual labels:  vulnerability-detection
penetration testing
🎩 [penetration testing Book], Kali Magic, Cryptography, Hash Crack, Botnet, Rootkit, Malware, Spyware, Python, Go, C|EH.
Stars: ✭ 57 (-78.65%)
Mutual labels:  security-testing
wazuh-packages
Wazuh - Tools for packages creation
Stars: ✭ 54 (-79.78%)
Mutual labels:  vulnerability-detection
iust deep fuzz
Advanced file format fuzzer based-on deep neural language models.
Stars: ✭ 36 (-86.52%)
Mutual labels:  vulnerability-detection
WireBug
WireBug is a toolset for Voice-over-IP penetration testing
Stars: ✭ 142 (-46.82%)
Mutual labels:  security-testing
T-XPLOITER
T-XPLOITER is a Perl program for detect and (even) exploit website(s). Why the name is T-XPLOITER ? T means Triple, XPLOITER means Exploiter. This program has 3 features and functions to detect and (even) exploit website(s), just check it out :).
Stars: ✭ 13 (-95.13%)
Mutual labels:  vulnerability-detection
patton-cli
The knife of the Admin & Security auditor
Stars: ✭ 42 (-84.27%)
Mutual labels:  vulnerability-detection
Electriceye
Continuously monitor your AWS services for configurations that can lead to degradation of confidentiality, integrity or availability. All results will be sent to Security Hub for further aggregation and analysis.
Stars: ✭ 255 (-4.49%)
Mutual labels:  security-tools
JWTweak
Detects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.
Stars: ✭ 85 (-68.16%)
Mutual labels:  vulnerability-assessment
cpan-audit
Check CPAN modules for known security vulnerabilities
Stars: ✭ 27 (-89.89%)
Mutual labels:  vulnerability-detection
ipa-medit
Memory modification tool for re-signed ipa supports iOS apps running on iPhone and Apple Silicon Mac without jailbreaking.
Stars: ✭ 141 (-47.19%)
Mutual labels:  security-testing
Lauschgeraet
Gets in the way of your victim's traffic and out of yours
Stars: ✭ 25 (-90.64%)
Mutual labels:  security-testing
kubescape
Kubescape is a K8s open-source tool providing a multi-cloud K8s single pane of glass, including risk analysis, security compliance, RBAC visualizer and image vulnerabilities scanning.
Stars: ✭ 7,340 (+2649.06%)
Mutual labels:  vulnerability-detection
Gr3eNoX
Advanced Vulnerability Scanner Tool
Stars: ✭ 42 (-84.27%)
Mutual labels:  vulnerability-scanners
TORhunter
Designed to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .onion
Stars: ✭ 47 (-82.4%)
Mutual labels:  vulnerability-scanners
NETNOOB
A simple program written in bash that contains basic Linux network tools, information gathering tools and scanning tools.
Stars: ✭ 105 (-60.67%)
Mutual labels:  vulnerability-scanners
www-project-zap
OWASP Zed Attack Proxy project landing page.
Stars: ✭ 52 (-80.52%)
Mutual labels:  vulnerability-assessment
Gr33k
图形化漏洞利用集成工具
Stars: ✭ 361 (+35.21%)
Mutual labels:  vulnerability-scanners
magicRecon
MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.
Stars: ✭ 478 (+79.03%)
Mutual labels:  vulnerability-scanners
Jira-Lens
Fast and customizable vulnerability scanner For JIRA written in Python
Stars: ✭ 185 (-30.71%)
Mutual labels:  vulnerability-scanners
Openrasp Iast
IAST 灰盒扫描工具
Stars: ✭ 253 (-5.24%)
Mutual labels:  security-tools
sicak
SIde-Channel Analysis toolKit: embedded security evaluation tools
Stars: ✭ 17 (-93.63%)
Mutual labels:  security-testing
klustair
(Deprecated) Submit all images in your Kubernetes cluster to Anchore for a vulnerability check and check your configuration with kubeaudit
Stars: ✭ 15 (-94.38%)
Mutual labels:  vulnerability-scanners
wazuh-puppet
Wazuh - Puppet module
Stars: ✭ 25 (-90.64%)
Mutual labels:  vulnerability-detection
vulnscan
A static binary vulnerability scanner
Stars: ✭ 47 (-82.4%)
Mutual labels:  vulnerability-scanners
JAW
JAW: A Graph-based Security Analysis Framework for JavaScript and Client-side CSRF
Stars: ✭ 26 (-90.26%)
Mutual labels:  vulnerability-detection
safelog4j
Safelog4j is an instrumentation-based security tool to help teams discover, verify, and solve log4shell vulnerabilities without scanning or upgrading
Stars: ✭ 38 (-85.77%)
Mutual labels:  security-testing
Automated-XSS-Finder
Automated XSS Finder
Stars: ✭ 53 (-80.15%)
Mutual labels:  security-testing
xssfinder
Toolset for detecting reflected xss in websites
Stars: ✭ 105 (-60.67%)
Mutual labels:  vulnerability-detection
k8s-harbor
Harbor in Kubernetes
Stars: ✭ 36 (-86.52%)
Mutual labels:  vulnerability-scanners
RedTeam toolkit
Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together.
Stars: ✭ 301 (+12.73%)
Mutual labels:  vulnerability-scanners
gradejs
GradeJS analyzes production Webpack bundles without having access to the source code of a website. Instantly see vulnerabilities, outdated packages, and more just by entering a web application URL.
Stars: ✭ 362 (+35.58%)
Mutual labels:  vulnerability-detection
ezEmu
See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)
Stars: ✭ 89 (-66.67%)
Mutual labels:  security-testing
SpyGen
Trojan 🐍 (keylogger, take screenshots, open your webcam) 🔓
Stars: ✭ 115 (-56.93%)
Mutual labels:  security-tools
Log4j-RCE-Scanner
Remote command execution vulnerability scanner for Log4j.
Stars: ✭ 200 (-25.09%)
Mutual labels:  vulnerability-scanners
Powerexploit
Post-Exploitation 😎 module for Penetration Tester and Hackers.
Stars: ✭ 26 (-90.26%)
Mutual labels:  vulnerability-assessment
FSEC-VM
Backend logic implementation for Vulnerability Management System
Stars: ✭ 19 (-92.88%)
Mutual labels:  vulnerability-scanners
GraphDeeSmartContract
Smart contract vulnerability detection using graph neural network (DR-GCN).
Stars: ✭ 84 (-68.54%)
Mutual labels:  vulnerability-detection
FUNDED NISL
FUNDED is a novel learning framework for building vulnerability detection models.
Stars: ✭ 49 (-81.65%)
Mutual labels:  vulnerability-detection
octovy
Trivy based vulnerability management service
Stars: ✭ 51 (-80.9%)
Mutual labels:  vulnerability-scanners
dep-scan
Fully open-source security audit for project dependencies based on known vulnerabilities and advisories. Supports both local repos and container images. Integrates with various CI environments such as Azure Pipelines, CircleCI and Google CloudBuild. No server required!
Stars: ✭ 346 (+29.59%)
Mutual labels:  vulnerability-scanners
aeacus
🔐 Vulnerability remediation scoring system
Stars: ✭ 52 (-80.52%)
Mutual labels:  vulnerability-assessment
PyCPU
Central Processing Unit Information Gathering Tool
Stars: ✭ 19 (-92.88%)
Mutual labels:  vulnerability-detection
inthewilddb
Hourly updated database of exploit and exploitation reports
Stars: ✭ 127 (-52.43%)
Mutual labels:  vulnerability-scanners
lava
Microsoft Azure Exploitation Framework
Stars: ✭ 46 (-82.77%)
Mutual labels:  vulnerability-assessment
61-120 of 600 similar projects