DSecureMe / vmc-docs
Documentation of vmc
☆16Updated 3 weeks ago
Alternatives and similar repositories for vmc-docs:
Users that are interested in vmc-docs are comparing it to the libraries listed below
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated last year
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- ☆21Updated last year
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 4 years ago
- A collection of tools for managing and automating vulnerability management.☆13Updated 3 years ago
- ☆19Updated 3 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Updated 3 years ago
- Virtual Security Operations Center☆50Updated last year
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Jumpstart multiple WebSocket servers quickly☆31Updated 3 years ago
- Collaborative pentest tool with highly customizable tools☆72Updated 3 years ago
- Create machine images containing the Nessus vulnerability scanner☆12Updated last week
- An advanced multithreaded admin panel finder written in python.☆14Updated 4 years ago
- ☆19Updated last year
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆55Updated 9 months ago
- This repository contains a Python client for interfacing with the [crt.sh](https://crt.sh/) website, allowing users to retrieve informati…☆13Updated 7 months ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆40Updated 2 years ago
- A learning and testing environment for web application hacking and pentesting.☆26Updated 4 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆20Updated 3 years ago
- ☆14Updated 4 years ago
- Web application pentesting recon☆23Updated 4 years ago
- Tool for fetching all the available waybackmachine snapshot urls☆21Updated 5 months ago
- WordPress version identification and vulnerability finder.☆31Updated 2 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆11Updated 3 years ago
- A Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)☆20Updated last year
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Updated 2 years ago