DSecureMe / vmc-docs
Documentation of vmc
☆14Updated 2 years ago
Alternatives and similar repositories for vmc-docs:
Users that are interested in vmc-docs are comparing it to the libraries listed below
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆18Updated last year
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 3 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- Create machine images containing the Nessus vulnerability scanner☆12Updated last month
- A learning and testing environment for web application hacking and pentesting.☆26Updated 4 years ago
- A collection of tools for managing and automating vulnerability management.☆13Updated 2 years ago
- A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.☆59Updated 4 years ago
- This repository contains a Python client for interfacing with the [crt.sh](https://crt.sh/) website, allowing users to retrieve informati…☆13Updated 6 months ago
- MyOpenVDP is a free web application to install a vulnerability disclosure policy or a vulnerability disclosure program on your assets. (V…☆27Updated 6 months ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Updated 3 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- Incident Response Plan for all major incidents including cheatsheets for both linux and windows☆14Updated 4 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Collaborative pentest tool with highly customizable tools☆72Updated 3 years ago
- Web application pentesting recon☆23Updated 4 years ago
- A repository of compiled and ready-to-use shells for Windows restricted environments.☆36Updated 5 years ago
- Shodan Monitoring integration for TheHive.☆130Updated 2 months ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- A repo containing simple programs to ease pentester with generated commands to avoid syntax issues☆13Updated 4 years ago
- ☆14Updated 4 years ago
- ☆21Updated last year
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆13Updated 10 months ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 4 years ago
- ☆22Updated 4 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Updated 2 years ago
- Objectify-s3 is a tool that recursively checks AWS S3 buckets and objects for misconfigured permissions.☆15Updated 7 months ago