Ostorlab / KEV
Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's Asteroid and Bug Bounty programs.
☆564Updated last week
Alternatives and similar repositories for KEV
Users that are interested in KEV are comparing it to the libraries listed below
Sorting:
- OXO is a security scanning orchestrator for the modern age.☆550Updated this week
- ☆292Updated 9 months ago
- A flexible threat detection platform that simplifies rule management and deployment using K8s CronJob and Helm, but can also run standalo…☆375Updated 7 months ago
- GitHub Actions Pipeline Enumeration and Attack Tool☆639Updated last month
- LDAP Watchdog: A real-time linux-compatible LDAP monitoring tool for detecting directory changes, providing visibility into additions, mo…☆187Updated last month
- Galah: An LLM-powered web honeypot.☆537Updated 3 weeks ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆218Updated 3 weeks ago
- Differential testing framework for HTTP implementations☆826Updated last week
- A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot), sqlite, excel and d2-lang. Simply put it's n…☆676Updated last month
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆226Updated 3 months ago
- GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.☆320Updated last week
- Private key usage verification☆431Updated last month
- Pen Test Report Generation and Assessment Collaboration☆520Updated last week
- CI/CD Security Analyzer☆658Updated 2 months ago
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆182Updated 8 months ago
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆691Updated 6 months ago
- Gram is Klarna's own threat model diagramming tool☆320Updated 2 weeks ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆245Updated last month
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆272Updated this week
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆449Updated last year
- Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.☆515Updated 2 months ago
- Attack surface detector that identifies endpoints by static analysis☆697Updated this week
- Awesome secure by default libraries to help you eliminate bug classes!☆690Updated 3 weeks ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆126Updated 6 months ago
- OSINT tool to find informations about a github user (email2username, username2email, creation date ...)☆458Updated last month
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆639Updated last month
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆278Updated 3 months ago
- Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.☆1,136Updated last year
- The Internets #1 Subdomain Takeover Tool☆249Updated 4 months ago
- cloudgrep is grep for cloud storage☆327Updated 2 months ago