dheaterD(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.
Stars: ✭ 142 (+158.18%)
Entityframework.commontoolsExtensions, Auditing, Concurrency Checks, JSON properties and Transaction Logs for EntityFramework and EFCore
Stars: ✭ 82 (+49.09%)
Ssh AuditorThe best way to scan for weak ssh passwords on your network
Stars: ✭ 516 (+838.18%)
CagCrypto Audit Guidelines
Stars: ✭ 115 (+109.09%)
Office365 Audit Log CollectorCollector script for retrieving audit logs from the Office 365 API with file or network/graylog output.
Stars: ✭ 39 (-29.09%)
FIDLA sane API for IDA Pro's decompiler. Useful for malware RE and vulnerability research
Stars: ✭ 421 (+665.45%)
Commit WatcherFind interesting and potentially hazardous commits in git projects
Stars: ✭ 345 (+527.27%)
ScoutsuiteMulti-Cloud Security Auditing Tool
Stars: ✭ 3,803 (+6814.55%)
Laravel AuditingRecord the change log from models in Laravel
Stars: ✭ 2,210 (+3918.18%)
rsGenrsGen is a Reverse Shell Payload Generator for hacking.
Stars: ✭ 71 (+29.09%)
Information Security TasksThis repository is created only for infosec professionals whom work day to day basis to equip ourself with uptodate skillset, We can daily contribute daily one hour for day to day tasks and work on problem statements daily, Please contribute by providing problem statements and solutions
Stars: ✭ 108 (+96.36%)
aemscanAdobe Experience Manager Vulnerability Scanner
Stars: ✭ 161 (+192.73%)
BlowholeDocker auditing and enumeration script.
Stars: ✭ 21 (-61.82%)
OtsecaOpen source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats.
Stars: ✭ 416 (+656.36%)
cve-2016-1764Extraction of iMessage Data via XSS
Stars: ✭ 52 (-5.45%)
RudderContinuous Auditing & Configuration
Stars: ✭ 314 (+470.91%)
NIST-to-TechAn open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (+10.91%)
AndroticklerPenetration testing and auditing toolkit for Android apps.
Stars: ✭ 225 (+309.09%)
pg-audit-jsonSimple, easily customised trigger-based auditing for PostgreSQL (Postgres). See also pgaudit.
Stars: ✭ 34 (-38.18%)
sledgehammer🔨 📶 WiFi-Jammer/DoS toolset
Stars: ✭ 34 (-38.18%)
gradejsGradeJS analyzes production Webpack bundles without having access to the source code of a website. Instantly see vulnerabilities, outdated packages, and more just by entering a web application URL.
Stars: ✭ 362 (+558.18%)
ad-privileged-auditProvides various Windows Server Active Directory (AD) security-focused reports.
Stars: ✭ 42 (-23.64%)
MaplesyrupAssesses CPU security of embedded devices. #nsacyber
Stars: ✭ 121 (+120%)
break-fast-serialA proof of concept that demonstrates asynchronous scanning for Java deserialization bugs
Stars: ✭ 53 (-3.64%)
Daudit🌲 Configuration flaws detector for Hadoop, MongoDB, MySQL, and more!
Stars: ✭ 108 (+96.36%)
VulnogramVulnogram is a tool for creating and editing CVE information in CVE JSON format
Stars: ✭ 103 (+87.27%)
Windows Secure Host BaselineConfiguration guidance for implementing the Windows 10 and Windows Server 2016 DoD Secure Host Baseline settings. #nsacyber
Stars: ✭ 1,288 (+2241.82%)
apachrotApache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker
Stars: ✭ 21 (-61.82%)
Gscan本程序旨在为安全应急响应人员对Linux主机排查时提供便利,实现主机侧Checklist的自动全面化检测,根据检测结果自动数据聚合,进行黑客攻击路径溯源。
Stars: ✭ 1,177 (+2040%)
vrt-rubyRuby library for interacting with Bugcrowd's VRT
Stars: ✭ 15 (-72.73%)
LynisLynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
Stars: ✭ 9,137 (+16512.73%)
weblogic honeypotWebLogic Honeypot is a low interaction honeypot to detect CVE-2017-10271 in the Oracle WebLogic Server component of Oracle Fusion Middleware. This is a Remote Code Execution vulnerability.
Stars: ✭ 30 (-45.45%)
Parse AuditorAudit module for Parse Platform
Stars: ✭ 19 (-65.45%)
TwaA tiny web auditor with strong opinions.
Stars: ✭ 549 (+898.18%)
vulnscanA static binary vulnerability scanner
Stars: ✭ 47 (-14.55%)
SshpiperThe missing reverse proxy for ssh scp
Stars: ✭ 489 (+789.09%)
astam-correlatorVulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple static/dynamic scans
Stars: ✭ 22 (-60%)
Django AuditlogA Django app that keeps a log of changes made to an object.
Stars: ✭ 412 (+649.09%)
auditA common audit framework for java application
Stars: ✭ 28 (-49.09%)
AuditFor auditing what collaborators, hooks, and deploy keys you have added on all your GitHub repositories.
Stars: ✭ 335 (+509.09%)
gvm-toolsRemote control your Greenbone Community Edition or Greenbone Enterprise Appliance
Stars: ✭ 143 (+160%)
Django Easy AuditYet another Django audit log app, hopefully the simplest one.
Stars: ✭ 289 (+425.45%)
overflowA command-line tool for exploiting stack-based buffer overflow vulnerabilities.
Stars: ✭ 66 (+20%)
FilewatcherA simple auditing utility for macOS
Stars: ✭ 233 (+323.64%)
trivy-vulnerability-explorerWeb application that allows to load a Trivy report in json format and displays the vulnerabilities of a single target in an interactive data table.
Stars: ✭ 63 (+14.55%)
Tracker Enabled DbcontextTracker-enabled DbContext offers you to implement full auditing in your database
Stars: ✭ 210 (+281.82%)
TraditionalMitigationTraditional Mitigation in GCC to defend Memory Corruption Vulnerability
Stars: ✭ 16 (-70.91%)
safelog4jSafelog4j is an instrumentation-based security tool to help teams discover, verify, and solve log4shell vulnerabilities without scanning or upgrading
Stars: ✭ 38 (-30.91%)
dnstakeDNSTake — A fast tool to check missing hosted DNS zones that can lead to subdomain takeover
Stars: ✭ 723 (+1214.55%)
DirstalkModern alternative to dirbuster/dirb
Stars: ✭ 210 (+281.82%)