Scan systems with NMap and parse the output to a list of CVE's, CWE's and DPE's
☆283Apr 12, 2020Updated 5 years ago
Alternatives and similar repositories for CVE-Scan
Users that are interested in CVE-Scan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilit…☆25May 5, 2017Updated 8 years ago
- cve-search - a tool to perform local searches for known vulnerabilities☆2,603Mar 18, 2026Updated last week
- Slackware scripts for things I like☆10Sep 20, 2016Updated 9 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Oct 7, 2015Updated 10 years ago
- Common Vulnerabilities and Exposures - Portal. Archived and now replaced by vulnerability-lookup.org☆87Mar 10, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A python wrapper around https://vulnerability.circl.lu.☆56Mar 13, 2026Updated last week
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆947May 28, 2021Updated 4 years ago
- Plugins written for CVE-Search☆27Apr 16, 2021Updated 4 years ago
- cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilit…☆146Feb 20, 2026Updated last month
- General scripts for random stuff☆38Oct 29, 2021Updated 4 years ago
- Command-line utility to scan the system and report on potential vulnerabilities, based on public CVE data☆269Dec 9, 2025Updated 3 months ago
- Vulnerability Information Aggregator for CVEs☆124Jun 13, 2019Updated 6 years ago
- Docker Image for CVE-Search☆119Feb 21, 2025Updated last year
- Python wrapper for the API of cve-search☆127Dec 5, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Search google for shellshock vulnerable sites☆27Oct 10, 2014Updated 11 years ago
- ☆16Mar 10, 2017Updated 9 years ago
- Advanced vulnerability scanning with Nmap NSE☆3,730Feb 6, 2026Updated last month
- Searchsploit alternative. It differs in that it uses searchengines, can run unattended in the background, plays well with nmap and is abl…☆17Jul 9, 2020Updated 5 years ago
- Mass scanner for the Java serialize bug☆152Jun 16, 2025Updated 9 months ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Jul 4, 2020Updated 5 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- whoareyou is a tool to find the underlying technology/software used in a list of websites passed through stdin (using Wappalyzer dataset)☆32Jun 15, 2020Updated 5 years ago
- Simple REST-style web service for the CVE searching☆97May 19, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Automatically scans for malicious proxies.☆31Mar 7, 2015Updated 11 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆114Feb 9, 2019Updated 7 years ago
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Mar 3, 2017Updated 9 years ago
- A tool for detecting XML External Entity (XXE) vulnerabilities in Java applications☆72Sep 4, 2014Updated 11 years ago
- Dockerized cve-search as a web app☆16Dec 18, 2017Updated 8 years ago
- Vulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.☆573Mar 8, 2023Updated 3 years ago
- The 'exploitable' GDB plugin☆747Aug 13, 2022Updated 3 years ago
- ✍️ A curated list of CVE PoCs.☆3,483Jan 4, 2022Updated 4 years ago
- Crawler that retrieves commoncrawl's crawled hosts and their corresponding IPs☆21Sep 1, 2025Updated 6 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Burp extension to passively scan for applications revealing software version numbers☆33May 30, 2024Updated last year
- An exploit for Apache Struts CVE-2017-5638☆442May 21, 2018Updated 7 years ago
- intel amt honeypot☆18May 9, 2017Updated 8 years ago
- A modular URL deduplication tool.☆19Feb 19, 2025Updated last year
- Network Scanner for OpenSSL Memory Leak (CVE-2014-0160)☆11Sep 24, 2015Updated 10 years ago
- Scanning alive hosts of the given CIDR range in parallel.☆10May 8, 2025Updated 10 months ago
- The Fastest way to consume Threat Intel☆26Apr 30, 2022Updated 3 years ago