Intrigue IdentApplication and Service Fingerprinting
Stars: ✭ 70 (-73.78%)
ProgpilotA static analysis tool for security
Stars: ✭ 226 (-15.36%)
OpenVAS-DockerA Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)
Stars: ✭ 16 (-94.01%)
scan-cli-pluginDocker Scan is a Command Line Interface to run vulnerability detection on your Dockerfiles and Docker images
Stars: ✭ 135 (-49.44%)
LibdiffuzzCustom memory allocator that helps discover reads from uninitialized memory
Stars: ✭ 147 (-44.94%)
Apk Meditmemory search and patch tool on debuggable apk without root & ndk
Stars: ✭ 189 (-29.21%)
SafetySafety checks your installed dependencies for known security vulnerabilities
Stars: ✭ 982 (+267.79%)
SecretscannerFind secrets and passwords in container images and file systems
Stars: ✭ 895 (+235.21%)
Honggfuzz RsFuzz your Rust code with Google-developed Honggfuzz !
Stars: ✭ 222 (-16.85%)
Salt ScannerLinux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration
Stars: ✭ 261 (-2.25%)
ochrona-cliA command line tool for detecting vulnerabilities in Python dependencies and doing safe package installs
Stars: ✭ 46 (-82.77%)
dependency-check-py🔐 Shim to easily install OWASP dependency-check-cli into Python projects
Stars: ✭ 44 (-83.52%)
apkutila useful utility for android app security testing
Stars: ✭ 52 (-80.52%)
vulnerability-dbVulnerability database and package search for sources such as OSV, NVD, GitHub and npm.
Stars: ✭ 36 (-86.52%)
ShonyDanzaA customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
Stars: ✭ 86 (-67.79%)
penetration testing🎩 [penetration testing Book], Kali Magic, Cryptography, Hash Crack, Botnet, Rootkit, Malware, Spyware, Python, Go, C|EH.
Stars: ✭ 57 (-78.65%)
wazuh-packagesWazuh - Tools for packages creation
Stars: ✭ 54 (-79.78%)
iust deep fuzzAdvanced file format fuzzer based-on deep neural language models.
Stars: ✭ 36 (-86.52%)
WireBugWireBug is a toolset for Voice-over-IP penetration testing
Stars: ✭ 142 (-46.82%)
T-XPLOITERT-XPLOITER is a Perl program for detect and (even) exploit website(s). Why the name is T-XPLOITER ? T means Triple, XPLOITER means Exploiter. This program has 3 features and functions to detect and (even) exploit website(s), just check it out :).
Stars: ✭ 13 (-95.13%)
patton-cliThe knife of the Admin & Security auditor
Stars: ✭ 42 (-84.27%)
ElectriceyeContinuously monitor your AWS services for configurations that can lead to degradation of confidentiality, integrity or availability. All results will be sent to Security Hub for further aggregation and analysis.
Stars: ✭ 255 (-4.49%)
JWTweakDetects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.
Stars: ✭ 85 (-68.16%)
cpan-auditCheck CPAN modules for known security vulnerabilities
Stars: ✭ 27 (-89.89%)
ipa-meditMemory modification tool for re-signed ipa supports iOS apps running on iPhone and Apple Silicon Mac without jailbreaking.
Stars: ✭ 141 (-47.19%)
LauschgeraetGets in the way of your victim's traffic and out of yours
Stars: ✭ 25 (-90.64%)
kubescapeKubescape is a K8s open-source tool providing a multi-cloud K8s single pane of glass, including risk analysis, security compliance, RBAC visualizer and image vulnerabilities scanning.
Stars: ✭ 7,340 (+2649.06%)
Gr3eNoXAdvanced Vulnerability Scanner Tool
Stars: ✭ 42 (-84.27%)
TORhunterDesigned to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .onion
Stars: ✭ 47 (-82.4%)
NETNOOBA simple program written in bash that contains basic Linux network tools, information gathering tools and scanning tools.
Stars: ✭ 105 (-60.67%)
www-project-zapOWASP Zed Attack Proxy project landing page.
Stars: ✭ 52 (-80.52%)
Gr33k图形化漏洞利用集成工具
Stars: ✭ 361 (+35.21%)
magicReconMagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.
Stars: ✭ 478 (+79.03%)
Jira-LensFast and customizable vulnerability scanner For JIRA written in Python
Stars: ✭ 185 (-30.71%)
sicakSIde-Channel Analysis toolKit: embedded security evaluation tools
Stars: ✭ 17 (-93.63%)
klustair(Deprecated) Submit all images in your Kubernetes cluster to Anchore for a vulnerability check and check your configuration with kubeaudit
Stars: ✭ 15 (-94.38%)
vulnscanA static binary vulnerability scanner
Stars: ✭ 47 (-82.4%)
JAWJAW: A Graph-based Security Analysis Framework for JavaScript and Client-side CSRF
Stars: ✭ 26 (-90.26%)
safelog4jSafelog4j is an instrumentation-based security tool to help teams discover, verify, and solve log4shell vulnerabilities without scanning or upgrading
Stars: ✭ 38 (-85.77%)
xssfinderToolset for detecting reflected xss in websites
Stars: ✭ 105 (-60.67%)
k8s-harborHarbor in Kubernetes
Stars: ✭ 36 (-86.52%)
RedTeam toolkitRed Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together.
Stars: ✭ 301 (+12.73%)
gradejsGradeJS analyzes production Webpack bundles without having access to the source code of a website. Instantly see vulnerabilities, outdated packages, and more just by entering a web application URL.
Stars: ✭ 362 (+35.58%)
ezEmuSee adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)
Stars: ✭ 89 (-66.67%)
SpyGenTrojan 🐍 (keylogger, take screenshots, open your webcam) 🔓
Stars: ✭ 115 (-56.93%)
Log4j-RCE-ScannerRemote command execution vulnerability scanner for Log4j.
Stars: ✭ 200 (-25.09%)
PowerexploitPost-Exploitation 😎 module for Penetration Tester and Hackers.
Stars: ✭ 26 (-90.26%)
FSEC-VMBackend logic implementation for Vulnerability Management System
Stars: ✭ 19 (-92.88%)
GraphDeeSmartContractSmart contract vulnerability detection using graph neural network (DR-GCN).
Stars: ✭ 84 (-68.54%)
FUNDED NISLFUNDED is a novel learning framework for building vulnerability detection models.
Stars: ✭ 49 (-81.65%)
octovyTrivy based vulnerability management service
Stars: ✭ 51 (-80.9%)
dep-scanFully open-source security audit for project dependencies based on known vulnerabilities and advisories. Supports both local repos and container images. Integrates with various CI environments such as Azure Pipelines, CircleCI and Google CloudBuild. No server required!
Stars: ✭ 346 (+29.59%)
aeacus🔐 Vulnerability remediation scoring system
Stars: ✭ 52 (-80.52%)
PyCPUCentral Processing Unit Information Gathering Tool
Stars: ✭ 19 (-92.88%)
inthewilddbHourly updated database of exploit and exploitation reports
Stars: ✭ 127 (-52.43%)
lavaMicrosoft Azure Exploitation Framework
Stars: ✭ 46 (-82.77%)