Openvas ScannerOpen Vulnerability Assessment Scanner - Scanner for Greenbone Vulnerability Management (GVM)
Stars: ✭ 1,056 (+2100%)
SecuritymanageframworkSecurity Manage Framwork is a security management platform for enterprise intranet, which includes asset management, vulnerability management, account management, knowledge base management, security scanning automation function modules, and can be used for internal security management. This platform is designed to help Party A with fewer security personnel, complicated business lines, difficult periodic inspection and low automation to better achieve internal safety management.
Stars: ✭ 378 (+687.5%)
JackhammerJackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
Stars: ✭ 633 (+1218.75%)
VulscanAdvanced vulnerability scanning with Nmap NSE
Stars: ✭ 2,305 (+4702.08%)
HellraiserVulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Stars: ✭ 413 (+760.42%)
VulnfanaticA Binary Ninja plugin for vulnerability research.
Stars: ✭ 203 (+322.92%)
NerveNERVE Continuous Vulnerability Scanner
Stars: ✭ 267 (+456.25%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+21672.92%)
CelerystalkAn asynchronous enumeration & vulnerability scanner. Run all the tools on all the hosts.
Stars: ✭ 333 (+593.75%)
Rapidscan🆕 The Multi-Tool Web Vulnerability Scanner.
Stars: ✭ 775 (+1514.58%)
VulsAgent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Stars: ✭ 8,844 (+18325%)
LynisLynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
Stars: ✭ 9,137 (+18935.42%)
Xunfeng巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
Stars: ✭ 3,131 (+6422.92%)
Rebel FrameworkAdvanced and easy to use penetration testing framework 💣🔎
Stars: ✭ 183 (+281.25%)
VanquishVanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases.
Stars: ✭ 449 (+835.42%)
PurifyAll-in-one tool for managing vulnerability reports from AppSec pipelines
Stars: ✭ 72 (+50%)
VailynA phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
Stars: ✭ 103 (+114.58%)
GorsairGorsair hacks its way into remote docker containers that expose their APIs
Stars: ✭ 678 (+1312.5%)
censys-maltegoCensys Maltego transforms! Take advantage of Censys transforms for Maltego to back your investigations with the most trusted Internet data available.
Stars: ✭ 25 (-47.92%)
EveboxWeb Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search
Stars: ✭ 286 (+495.83%)
avainA Modular Framework for the Automated Vulnerability Analysis in IP-based Networks
Stars: ✭ 56 (+16.67%)
osint-combinerCombining OSINT sources in Elastic Stack
Stars: ✭ 77 (+60.42%)
nmap-censysNSE script which leverages the Censys Search API for passive data collection
Stars: ✭ 34 (-29.17%)
Home-LabThis is the network diagrams, configuration guides, and hardware used for my home lab.
Stars: ✭ 62 (+29.17%)
Tincan TlsA cleanroom implementation of TLS 1.3
Stars: ✭ 18 (-62.5%)
gvm-toolsRemote control your Greenbone Community Edition or Greenbone Enterprise Appliance
Stars: ✭ 143 (+197.92%)
NmapIdiomatic nmap library for go developers
Stars: ✭ 391 (+714.58%)
waycupA minimal tool that hides your online assets from online security scanners, researchers and hackers.
Stars: ✭ 100 (+108.33%)
Sysmon ConfigSysmon configuration file template with default high-quality event tracing
Stars: ✭ 3,287 (+6747.92%)
CamHellIngenic T10 IP camera crawler
Stars: ✭ 53 (+10.42%)
maalikFeature-rich Post Exploitation Framework with Network Pivoting capabilities.
Stars: ✭ 75 (+56.25%)
mmhdanCalculate fingerprints of a website for OSINT search
Stars: ✭ 35 (-27.08%)
dexIoT device indexer and search engine.
Stars: ✭ 53 (+10.42%)
edgeApplication-embedded connectivity and zero-trust components
Stars: ✭ 44 (-8.33%)
dep-scanFully open-source security audit for project dependencies based on known vulnerabilities and advisories. Supports both local repos and container images. Integrates with various CI environments such as Azure Pipelines, CircleCI and Google CloudBuild. No server required!
Stars: ✭ 346 (+620.83%)
Virtual RealityStealthy backdoor for Windows operating systems
Stars: ✭ 235 (+389.58%)
InsectsawakeNetwork Vulnerability Scanner
Stars: ✭ 252 (+425%)
CameradarCameradar hacks its way into RTSP videosurveillance cameras
Stars: ✭ 2,775 (+5681.25%)
Dr checkerDR.CHECKER : A Soundy Vulnerability Detection Tool for Linux Kernel Drivers
Stars: ✭ 251 (+422.92%)
NIST-to-TechAn open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (+27.08%)
FSEC-VMBackend logic implementation for Vulnerability Management System
Stars: ✭ 19 (-60.42%)
inthewilddbHourly updated database of exploit and exploitation reports
Stars: ✭ 127 (+164.58%)
HawkeyeHawkeye filesystem analysis tool
Stars: ✭ 202 (+320.83%)
AryAry 是一个集成类工具,主要用于调用各种安全工具,从而形成便捷的一键式渗透。
Stars: ✭ 241 (+402.08%)
ProgpilotA static analysis tool for security
Stars: ✭ 226 (+370.83%)
Ee OutliersOpen-source framework to detect outliers in Elasticsearch events
Stars: ✭ 172 (+258.33%)
Sec Admin分布式资产安全扫描核心管理系统(弱口令扫描,漏洞扫描)
Stars: ✭ 222 (+362.5%)
Angularjs Csti ScannerAutomated client-side template injection (sandbox escape/bypass) detection for AngularJS.
Stars: ✭ 214 (+345.83%)
feverfast, extensible, versatile event router for Suricata's EVE-JSON format
Stars: ✭ 47 (-2.08%)
GoaltdnsA permutation generation tool written in golang
Stars: ✭ 119 (+147.92%)
Grinder🔎 Python framework to automatically discover and enumerate hosts from different back-end systems (Shodan, Censys)
Stars: ✭ 209 (+335.42%)
NetsetOperational Security utility and automator.
Stars: ✭ 110 (+129.17%)
EnumyLinux post exploitation privilege escalation enumeration
Stars: ✭ 210 (+337.5%)
Sbt Dependency CheckSBT Plugin for OWASP DependencyCheck. Monitor your dependencies and report if there are any publicly known vulnerabilities (e.g. CVEs). 🌈
Stars: ✭ 187 (+289.58%)