CERT-Polska / Artemis-modules-extraLinks
☆35Updated this week
Alternatives and similar repositories for Artemis-modules-extra
Users that are interested in Artemis-modules-extra are comparing it to the libraries listed below
Sorting:
- MyOpenVDP is a free web application to install a vulnerability disclosure policy or a vulnerability disclosure program on your assets. (V…☆31Updated last year
- Script for importing Nmap results into a Neo4j Graph Database☆23Updated 5 months ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated 2 years ago
- Provides an overview of the inner file structure of a PDF☆25Updated 3 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated last year
- Modular web-application honeypot platform built using go and gin☆60Updated last year
- Script to test NetSec capabilities.☆21Updated 2 years ago
- FastCVE: A Dockerized CVE search tool with API and CLI support for security vulnerability queries.☆56Updated 4 months ago
- Damn Vulnerable Browser Extension (DVBE), previously named as Badly Coded Browser Extension (BCBE), is an open-source vulnerable Chrome E…☆31Updated 7 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated last year
- Cloudformation Template to Launch the SOC from Kali Purple☆52Updated last year
- Nuclei plugins to audit Chrome extensions☆65Updated last year
- Jumpstart multiple WebSocket servers quickly☆32Updated 3 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆22Updated 2 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆78Updated 2 years ago
- Secret Scanner for Slack, Jira, Confluence, Asana, Wrike, Linear, Zendesk, GitHub, and GitLab☆68Updated 2 weeks ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆72Updated last year
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Updated 2 years ago
- a smart DNS response-guided subdomain fuzzer☆156Updated 2 years ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆57Updated 2 years ago
- ReconPal: Leveraging NLP for Infosec☆56Updated 3 years ago
- ☆60Updated 2 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated last year
- Enhance your malware detection with WAF + YARA (WAFARAY)☆109Updated 3 years ago
- OWASP Amass Docker Compose for setting up a full instance of the infrastructure☆49Updated 3 months ago
- A fast and comprehensive tool for organizational network scanning☆134Updated last year
- a hackbot proof-of-concept☆40Updated last year
- ☆24Updated 3 months ago
- Additional active scan checks for BURP☆28Updated last year