CERTCC / Vulnerability-Data-Archive-Tools
Tools for working with the CERT Vulnerability Data Archive. See also https://github.com/CERTCC/Vulnerability-Data-Archive
☆19Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for Vulnerability-Data-Archive-Tools
- Code for modeling and managing credentials in Metasploit, implemented as a Rails Engine☆29Updated 4 months ago
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆28Updated 9 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 13 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- DPE - Default Password Enumeration☆32Updated 11 years ago
- Maltego with a twist of wireless☆25Updated 9 years ago
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 9 years ago
- ☆19Updated 9 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Updated 9 years ago
- Plugins written for CVE-Search☆25Updated 3 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 7 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆36Updated 10 years ago
- Hacking environment installation scripts for OS X☆26Updated 2 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 6 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Updated 10 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 9 years ago
- w3af packaging for Kali distribution☆26Updated 8 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Oracle Database 12c password brute forcer☆27Updated 9 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Updated 11 years ago
- Open Standard Vulnerability & Compliance Scanner☆41Updated 9 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 5 years ago
- A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework☆37Updated 4 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated 11 months ago