VMC: a Scalable, Open Source and Free Vulnerability Management Platform
☆92Jan 22, 2025Updated last year
Alternatives and similar repositories for vmc
Users that are interested in vmc are comparing it to the libraries listed below
Sorting:
- Documentation of vmc☆16Mar 4, 2025Updated last year
- Ruggedy Vulnerability Management App☆14Dec 8, 2019Updated 6 years ago
- Network Scanner for OpenSSL Memory Leak (CVE-2014-0160)☆11Sep 24, 2015Updated 10 years ago
- ☆43Dec 24, 2025Updated 2 months ago
- An open source badge☆10Oct 8, 2025Updated 5 months ago
- ASOC, ASPM, DevSecOps, Vulnerability Management Using ArcherySec.☆2,443Jun 11, 2025Updated 9 months ago
- A collection of PowerShell modules for interacting with the Shodan API. Includes modules for returning information about the API, client …☆24Jul 26, 2024Updated last year
- A repo for output of an intrusion prediction project☆11Mar 15, 2026Updated last week
- Kaze's openly available CVE vulnerability data.☆16Apr 7, 2025Updated 11 months ago
- WebFuzzer - Web Application Security Scanner by Cystack Team☆25Mar 14, 2017Updated 9 years ago
- Summarize CTI reports with OpenAI☆18Updated this week
- A command line interface for batch data insertion / retrieval from a Tenable Network Security Nessus SecurityCenter instance, with accomp…☆11May 16, 2018Updated 7 years ago
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆16Jul 19, 2022Updated 3 years ago
- ☆19Mar 13, 2026Updated last week
- ☆12Sep 8, 2025Updated 6 months ago
- This project allows you to use the S3 API to perform operations against a Manta object store.☆13Oct 7, 2016Updated 9 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Nov 12, 2021Updated 4 years ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆129Apr 3, 2025Updated 11 months ago
- Augmentation to Machine Readable CTI☆37Sep 9, 2025Updated 6 months ago
- ☆48Feb 22, 2023Updated 3 years ago
- Exploit & Vulnerability Intelligence Repository☆23Jan 20, 2025Updated last year
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from them☆19Updated this week
- NTLM/Negotiate authentication over HTTP that supports Pass The Hash Mode (PtH)☆17Sep 13, 2024Updated last year
- A Prometheus-format exporter to report on DockerHub per-image rate limits☆11Mar 6, 2026Updated 2 weeks ago
- VSCode extension for working with Architecture As A Code in the C4 model. Includes syntax highlighting, diagram preview, and tools for wo…☆35Mar 6, 2026Updated 2 weeks ago
- ☆11Dec 26, 2023Updated 2 years ago
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- Python implementation of Stakeholder-Specific Vulnerability Categorization (SSVC)☆23Jan 21, 2026Updated 2 months ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- ☆53Aug 22, 2021Updated 4 years ago
- simple command line for various AWS management tasks☆23Dec 4, 2025Updated 3 months ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- Parse YAML blocks into structured data.☆14Jul 28, 2019Updated 6 years ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- Revok is an online self-service web application security scanner, finding common web security issues with minimal cost.☆17May 13, 2015Updated 10 years ago
- OWASP Kubernetes Security Testing Guide☆42Dec 22, 2025Updated 3 months ago
- 🐳 Docker based Golang development environment☆12Nov 15, 2020Updated 5 years ago
- Stakeholder-Specific Vulnerability Categorization☆176Updated this week
- Open Source Vulnerability Management Platform☆6,298Feb 13, 2026Updated last month