Kenna Security API and Scripting Toolkit
☆34Feb 20, 2026Updated last month
Alternatives and similar repositories for toolkit
Users that are interested in toolkit are comparing it to the libraries listed below
Sorting:
- Defines the Replicated Platform Hands-On Labs powered by the Instruqt platform☆16Feb 24, 2026Updated 3 weeks ago
- MultiStep MCP That Returns CVE Information With EPSS Score☆13May 22, 2025Updated 10 months ago
- Buffer_Helper tool have you to discover classic buffer overflow vulnerabilities in application same like "FTP SERVER","FTPClient" etc , …☆15Oct 5, 2023Updated 2 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- ☆30Jul 29, 2021Updated 4 years ago
- THOR Thunderstorm Collectors☆25Mar 14, 2026Updated last week
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- Inject JavaScript within PDF document body☆18Jan 6, 2023Updated 3 years ago
- Ripple20 Critical Vulnerabilities - Detection Logic and Signatures☆12May 28, 2021Updated 4 years ago
- Askaway Open Source☆12Jan 31, 2023Updated 3 years ago
- A CLI front-end the salt-api written in Go.☆15Dec 16, 2017Updated 8 years ago
- Small tools to assist with using Large Language Models☆12Nov 7, 2023Updated 2 years ago
- WPAUDIT: Advanced WordPress security auditing suite & vulnerability scanner. Automates pentesting with Nmap, WPScan, Nuclei, SQLMap. Comp…☆34May 27, 2025Updated 9 months ago
- A better SSL cipher checker using gnutls☆28May 17, 2017Updated 8 years ago
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- An AI-powered plugin for Caldera that orchestrates long-running LLM workflows to automatically create adversary emulation abilities and p…☆24Updated this week
- Exports MISP events to STIX and ingest into McAfee ESM☆15Feb 12, 2020Updated 6 years ago
- ☆28Aug 5, 2022Updated 3 years ago
- .NET Standard compatible Slack RTM client☆10Sep 14, 2022Updated 3 years ago
- Demo notes & scripts for Buoyant's mTLS workshop.☆20Jun 17, 2022Updated 3 years ago
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated 3 months ago
- Metasploit Red Team Competition Modules☆13Apr 10, 2011Updated 14 years ago
- Salt Extension modules for Proxmox VE☆23Jan 27, 2026Updated last month
- Units of measurement in Kotlin☆11Feb 9, 2026Updated last month
- A JRuby implementation of the BurpExtender interface for PortSwigger Burp Suite. Not currently maintained -- see tduehr/buby☆28Apr 30, 2011Updated 14 years ago
- Grasswire Platform☆22Mar 6, 2016Updated 10 years ago
- Maturity Model Collaborative project☆15Feb 27, 2023Updated 3 years ago
- OASIS TC Open Repository: A GitHub repository for management of non-normative information about the work of the CSAF Technical Committee,…☆21Mar 13, 2026Updated last week
- Python SDK to access the vulnerability database☆22Sep 5, 2019Updated 6 years ago
- Patient Genomics Research Case☆14Jun 12, 2019Updated 6 years ago
- An easy to grep dump of the NVD database showing only; CVE-ID, CVSS Risk Score, and Summary.☆56May 5, 2022Updated 3 years ago
- Build scripts used to prepare self-contained packages of Arachni.☆13May 11, 2022Updated 3 years ago
- Application which generates SWID-Tags from Linux package managers like dpkg, rpm or pacman.☆16Sep 9, 2021Updated 4 years ago
- Heel is a small static web server for use when you need a quick web server for a directory.☆68May 6, 2024Updated last year
- Atomist SDM to find exposed secrets in repos☆19Apr 23, 2019Updated 6 years ago
- Install individual components from cab installers into wine☆31May 28, 2019Updated 6 years ago
- ☆35Jun 22, 2021Updated 4 years ago
- A Custom Scanner for Burp☆31Mar 26, 2014Updated 11 years ago
- Data perimeter helper is a tool that helps you design and anticipate the impact of your data perimeter controls☆17Jan 21, 2026Updated 2 months ago