Ostorlab / KEV
Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's Asteroid and Bug Bounty programs.
☆558Updated last week
Alternatives and similar repositories for KEV:
Users that are interested in KEV are comparing it to the libraries listed below
- OXO is a security scanning orchestrator for the modern age.☆546Updated this week
- ☆289Updated 7 months ago
- A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot), sqlite, excel and d2-lang. Simply put it's n…☆670Updated 3 weeks ago
- GitHub Actions Pipeline Enumeration and Attack Tool☆586Updated this week
- A flexible threat detection platform that simplifies rule management and deployment using K8s CronJob and Helm, but can also run standalo…☆373Updated 5 months ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆272Updated 3 weeks ago
- Galah: An LLM-powered web honeypot.☆496Updated 4 months ago
- reverse shell using curl☆205Updated last week
- LDAP Watchdog: A real-time linux-compatible LDAP monitoring tool for detecting directory changes, providing visibility into additions, mo…☆184Updated last year
- CI/CD Security Analyzer☆652Updated last week
- Gram is Klarna's own threat model diagramming tool☆319Updated this week
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆123Updated 4 months ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆217Updated 3 weeks ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆216Updated last week
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆228Updated 5 months ago
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆335Updated 3 months ago
- FlowAnalyzer is a tool to help in testing and analyzing OAuth 2.0 Flows, including OpenID Connect (OIDC).☆179Updated 7 months ago
- eBPF Port Knocking Tool☆232Updated last year
- Credentials Dumper for Linux using eBPF☆1,132Updated 5 months ago
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆663Updated 4 months ago
- Differential fuzzing REPL for HTTP implementations.☆783Updated this week
- Panthera(P.)uncia - Official CLI utility for Osprey Vision, Subdomain Center & Exploit Observer.☆643Updated last week
- ☆531Updated 11 months ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆256Updated 8 months ago
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆174Updated 5 months ago
- Attack surface detector that identifies endpoints by static analysis☆669Updated this week
- A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle,…☆292Updated last week
- Tools to assess DNS security.☆152Updated last year
- Pen Test Report Generation and Assessment Collaboration☆468Updated this week
- reverse shell using curl☆452Updated 10 months ago