VMC: a Scalable, Open Source and Free Vulnerability Management Platform
☆92Jan 22, 2025Updated last year
Alternatives and similar repositories for vmc
Users that are interested in vmc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ruggedy Vulnerability Management App☆14Dec 8, 2019Updated 6 years ago
- ☆44Apr 13, 2026Updated 2 weeks ago
- ASOC, ASPM, DevSecOps, Vulnerability Management Using ArcherySec.☆2,454Jun 11, 2025Updated 10 months ago
- The difference between exploitation prediction and detection is akin to the difference between detecting a missile launch or a detonation…☆13Updated this week
- Zone transfer a domain from its own NS servers and bruteforce subdomains☆12Mar 8, 2025Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Download all epss data, and import database. We can explore the data by SQL querys!☆11May 23, 2024Updated last year
- Summarize CTI reports with OpenAI☆18Updated this week
- Parallel ssdeep clustering kit☆20Dec 24, 2017Updated 8 years ago
- A tool to generate datasets and models based on vulnerabilities descriptions from @Vulnerability-Lookup.☆25Updated this week
- A compilation of network scanning strategies to find vulnerable devices☆73Nov 6, 2022Updated 3 years ago
- OSCP material tools and helpful scripts.☆14Apr 12, 2026Updated 2 weeks ago
- GCNotify is an Outlook addin for quickly forwarding mail as attachment to a pre-defined e-mail address.☆12Jan 17, 2023Updated 3 years ago
- Collection of scripts to extract Azure resource information to support security compliance audit.☆22Jan 18, 2022Updated 4 years ago
- PowerShell script to create SCCM environment.☆11Jul 6, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Terraform config to spin up a domain controller and some member servers in azure☆33Apr 11, 2022Updated 4 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Nov 12, 2021Updated 4 years ago
- A Python-based security assessment tool for continuous automated security scanning and monitoring of domains.☆13Apr 4, 2025Updated last year
- Augmentation to Machine Readable CTI☆38Apr 22, 2026Updated last week
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from them☆19Updated this week
- Exploit & Vulnerability Intelligence Repository☆24Jan 20, 2025Updated last year
- NTLM/Negotiate authentication over HTTP that supports Pass The Hash Mode (PtH)☆17Sep 13, 2024Updated last year
- ☆36Apr 18, 2026Updated last week
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Scout - a Contactless Active Reconnaissance Tool☆56Dec 8, 2022Updated 3 years ago
- ☆77Apr 8, 2026Updated 3 weeks ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- ☆52Aug 22, 2021Updated 4 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- The Singularity Community Catalog of Singularity* recipe files.☆11Oct 27, 2025Updated 6 months ago
- Write reusable JavaScript functions using Asynchronous Module Definitions☆11May 18, 2022Updated 3 years ago
- Evolution of Discrete data with Reinforcement Learning☆13Dec 8, 2019Updated 6 years ago
- Open Source Vulnerability Management Platform☆6,389Apr 21, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Examples of using Consul Connect features in Nomad☆11Updated this week
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- Stakeholder-Specific Vulnerability Categorization☆180Apr 24, 2026Updated last week
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 10 months ago
- ☆36Feb 20, 2026Updated 2 months ago
- ☆12Jan 7, 2023Updated 3 years ago
- ☆11Apr 15, 2021Updated 5 years ago