Ostorlab / KEVLinks
Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's Asteroid and Bug Bounty programs.
☆568Updated this week
Alternatives and similar repositories for KEV
Users that are interested in KEV are comparing it to the libraries listed below
Sorting:
- OXO is a security scanning orchestrator for the modern age.☆551Updated this week
- ☆293Updated 10 months ago
- A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot), sqlite, excel and d2-lang. Simply put it's n…☆680Updated last month
- A flexible threat detection platform that simplifies rule management and deployment using K8s CronJob and Helm, but can also run standalo…☆376Updated 8 months ago
- GitHub Actions Pipeline Enumeration and Attack Tool☆647Updated last month
- CI/CD Security Analyzer☆658Updated 3 months ago
- A repo to conduct vulnerability enrichment.☆636Updated this week
- Galah: An LLM-powered web honeypot.☆544Updated 2 weeks ago
- LDAP Watchdog: A real-time linux-compatible LDAP monitoring tool for detecting directory changes, providing visibility into additions, mo…☆187Updated last month
- Panthera(P.)uncia - Official CLI utility for Osprey Vision, Subdomain Center & Exploit Observer.☆647Updated this week
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆700Updated 7 months ago
- Credentials Dumper for Linux using eBPF☆1,138Updated 8 months ago
- APIDetector: Efficiently scan for exposed Swagger endpoints across web domains and subdomains. Supports HTTP/HTTPS, multi-threading, and …☆315Updated 2 months ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆249Updated 2 weeks ago
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,032Updated 6 months ago
- Customized CVE FEED Notifier☆114Updated last month
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆646Updated 2 months ago
- Pen Test Report Generation and Assessment Collaboration☆525Updated this week
- Differential testing framework for HTTP implementations☆829Updated 3 weeks ago
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆298Updated last week
- An Open Letter to the OWASP Board☆106Updated last year
- FlowAnalyzer is a tool to help in testing and analyzing OAuth 2.0 Flows, including OpenID Connect (OIDC).☆181Updated 10 months ago
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆450Updated last year
- Redeye is a tool intended to help you manage your data during a pentest operation☆465Updated 9 months ago
- Websec interview questions by tib3rius answered☆309Updated last year
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆159Updated 6 months ago
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆159Updated 6 months ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆218Updated last month
- Okta Verify and Okta FastPass Abuse Tool☆321Updated 9 months ago
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆202Updated this week