Ostorlab / KEV
Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's Asteroid and Bug Bounty programs.
☆542Updated this week
Related projects ⓘ
Alternatives and complementary repositories for KEV
- OXO is a security scanning orchestrator for the modern age.☆528Updated last week
- ☆292Updated 3 months ago
- GitHub Actions Pipeline Enumeration and Attack Tool☆570Updated 3 months ago
- CI/CD Security Analyzer☆625Updated last month
- A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot), sqlite, excel and d2-lang. Simply put it's n…☆654Updated 3 months ago
- A flexible threat detection platform that simplifies rule management and deployment using K8s CronJob and Helm, but can also run standalo…☆352Updated last month
- LDAP Watchdog: A real-time linux-compatible LDAP monitoring tool for detecting directory changes, providing visibility into additions, mo…☆171Updated 10 months ago
- Pen Test Report Generation and Assessment Collaboration☆443Updated this week
- Automatically detect potential vulnerabilities and analyze repository metrics to prioritize open source security research targets☆181Updated this week
- An Open Letter to the OWASP Board☆106Updated last year
- Galah: An LLM-powered web honeypot.☆413Updated last month
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆633Updated last month
- Differential fuzzing REPL for HTTP implementations.☆717Updated last week
- Attack surface detector that identifies endpoints by static analysis☆607Updated this week
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆253Updated last week
- Websec interview questions by tib3rius answered☆303Updated last year
- Gram is Klarna's own threat model diagramming tool☆282Updated this week
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆207Updated 2 months ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆196Updated last month
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆448Updated 7 months ago
- 💀 Don't fear the Reaper 👻☆390Updated this week
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆121Updated 3 weeks ago
- Deep Linux runtime visibility meets Wireshark☆244Updated last week
- BLint is a Binary Linter to check the security properties, and capabilities in your executables. Since v2, blint is also an SBOM generato…☆343Updated last week
- Awesome secure by default libraries to help you eliminate bug classes!☆669Updated 3 weeks ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆198Updated this week
- cloudgrep is grep for cloud storage☆318Updated this week
- A humble, and 𝗳𝗮𝘀𝘁, security-oriented HTTP headers analyzer.☆261Updated this week
- A modular vulnerability scanner with automatic report generation capabilities.☆561Updated this week
- boostsecurityio/poutine☆231Updated this week