Ostorlab / KEVLinks
Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's Asteroid and Bug Bounty programs.
☆598Updated 3 months ago
Alternatives and similar repositories for KEV
Users that are interested in KEV are comparing it to the libraries listed below
Sorting:
- OXO is a security scanning orchestrator for the modern age.☆560Updated this week
- ☆314Updated 6 months ago
- A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot), sqlite, excel and d2-lang. Simply put it's n…☆717Updated 3 weeks ago
- GitHub Actions Pipeline Enumeration and Attack Tool☆722Updated 3 months ago
- LDAP Watchdog: A real-time linux-compatible LDAP monitoring tool for detecting directory changes, providing visibility into additions, mo…☆191Updated 9 months ago
- CI/CD Security Analyzer☆729Updated 10 months ago
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆739Updated last month
- A flexible threat detection platform that simplifies rule management and deployment using K8s CronJob and Helm, but can also run standalo…☆384Updated last year
- Tunnel TCP connections through a file☆1,037Updated last month
- Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.☆1,290Updated 5 months ago
- Galah: An LLM-powered web honeypot.☆628Updated 5 months ago
- A humble, and 𝗳𝗮𝘀𝘁, security-oriented HTTP headers analyzer.☆347Updated last week
- Pen Test Report Generation and Assessment Collaboration☆585Updated 3 weeks ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆314Updated 3 months ago
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆462Updated last year
- An Open Letter to the OWASP Board☆107Updated 2 years ago
- ☆571Updated 3 years ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆275Updated 7 months ago
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆223Updated last year
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆434Updated last week
- A repo to conduct vulnerability enrichment.☆710Updated this week
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆234Updated 11 months ago
- Customized CVE FEED Notifier☆114Updated 8 months ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆139Updated 3 months ago
- Panthera(P.)uncia - Official CLI utility for Osprey Vision, Subdomain Center & Exploit Observer.☆660Updated 6 months ago
- An offensive data enrichment pipeline☆882Updated last week
- Differential testing framework for HTTP implementations☆920Updated last month
- Passive hostname, domain and IP lookup tool for non-robots☆1,670Updated last month
- Credentials Dumper for Linux using eBPF☆1,157Updated last year
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆227Updated last month