NorthernSec / Vulnerability-managementLinks
Vulnerability Management tool using the CVE-Search database
☆10Updated 9 years ago
Alternatives and similar repositories for Vulnerability-management
Users that are interested in Vulnerability-management are comparing it to the libraries listed below
Sorting:
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Simple REST-style web service for the CVE searching☆98Updated 2 years ago
- Deploy MISP Project software with Vagrant.☆43Updated 5 years ago
- Python API for the CVSS v3☆59Updated 4 years ago
- Generate MS Word template-based reports with HP WebInspect / Burp Suite Pro input, own custom data and knowledge base.☆67Updated last year
- Passive Network Audit Framework☆32Updated 7 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- The currently released SimpleRisk source code.☆97Updated 3 months ago
- A finder of domain typos showing country of IP address☆166Updated last year
- Nix Audit made easier (RHEL, CentOS)☆65Updated 3 months ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated last year
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Updated 6 years ago
- VirusTotal SIEM Integration and Automation☆18Updated 8 years ago
- Nmap enumeration and script scan automation script☆38Updated 2 years ago
- Common Vulnerabilities and Exposures - Portal. Archived and now replaced by vulnerability-lookup.org☆86Updated 5 months ago
- Scripts that we use for pentesting☆42Updated 8 years ago
- ☆30Updated 6 years ago
- Automated Security Assessment Reporting Tool☆37Updated 7 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆54Updated 8 months ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- ☆61Updated 7 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- Legal, procedural and policies document templates for operating an IRT☆64Updated last year
- Automatically exported from code.google.com/p/nipper-ng☆70Updated 3 years ago
- Manage all logistical information for a pentest including clients, contacts, employees, findings, projects, scoping, and vulnerabilities.☆42Updated last year
- Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and fir…☆21Updated 8 years ago
- Lootbox downloads open directories shared on Twitter.☆34Updated 4 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated 2 years ago
- Exfiltrate files via DNS☆95Updated 11 years ago