OWASP / SSVLLinks
Simple Software Vulnerability Language (SSVL)
☆13Updated 10 years ago
Alternatives and similar repositories for SSVL
Users that are interested in SSVL are comparing it to the libraries listed below
Sorting:
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Normalizer for honeypot data.☆45Updated 10 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated last year
- WebApp Honeypot for detecting Shell Shock exploit attempts☆55Updated 3 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- ☆90Updated 2 weeks ago
- a mass web screenshot tool for mapping web networks.☆24Updated 10 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Updated 8 years ago
- Simple REST-style web service for the CVE searching☆98Updated 2 years ago
- IPV6 MITM attack tool☆92Updated 12 years ago
- This is a bundle of python and bash penetration testing tools for recon and information gathering.☆80Updated 9 years ago
- Exploits and research stuffs☆55Updated 2 years ago
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 10 years ago
- This script is designed for detection of vulnerable servers (CVE-2014-0224.) in a wide range of configurations. It attempts to negotiat…☆40Updated 11 years ago
- A better SSL cipher checker using gnutls☆28Updated 8 years ago
- A Network Inspection Tool☆82Updated 7 years ago
- A schema language for JSON documents that allows validation and compilation into various database engines☆40Updated 7 months ago
- ☆75Updated 11 years ago
- Phishing toolkit for red teams and pentesters.☆126Updated 7 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆58Updated 10 years ago
- The NoSQL Honeypot Framework☆102Updated last year
- Tagging and annotation framework for scan data☆102Updated 6 years ago
- User, contributor and developer friendly vulnerability database☆128Updated 6 years ago
- Metasploit Framework☆26Updated last month
- Enabling 2fac confirmation for newly connected USB devices☆45Updated 9 years ago
- Collection of tools for web recon and enumeration.☆56Updated 10 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 9 years ago
- Clone of Metasploit's wiki w/ additions☆17Updated 9 years ago
- Exfiltrate files via DNS☆95Updated 12 years ago