Ostorlab / KEVLinks
Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's Asteroid and Bug Bounty programs.
☆584Updated 3 weeks ago
Alternatives and similar repositories for KEV
Users that are interested in KEV are comparing it to the libraries listed below
Sorting:
- OXO is a security scanning orchestrator for the modern age.☆556Updated 3 weeks ago
- A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot), sqlite, excel and d2-lang. Simply put it's n…☆694Updated 4 months ago
- ☆314Updated last month
- CI/CD Security Analyzer☆667Updated 6 months ago
- LDAP Watchdog: A real-time linux-compatible LDAP monitoring tool for detecting directory changes, providing visibility into additions, mo…☆189Updated 4 months ago
- GitHub Actions Pipeline Enumeration and Attack Tool☆701Updated 2 months ago
- A flexible threat detection platform that simplifies rule management and deployment using K8s CronJob and Helm, but can also run standalo…☆383Updated 10 months ago
- Galah: An LLM-powered web honeypot.☆574Updated last month
- Customized CVE FEED Notifier☆114Updated 4 months ago
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆252Updated last week
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆353Updated last week
- Gram is Klarna's own threat model diagramming tool☆324Updated 3 weeks ago
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆712Updated 3 weeks ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆220Updated 2 months ago
- 💀 Don't fear the Reaper 👻☆581Updated 2 weeks ago
- Awesome secure by default libraries to help you eliminate bug classes!☆699Updated 4 months ago
- A repo to conduct vulnerability enrichment.☆670Updated this week
- Pen Test Report Generation and Assessment Collaboration☆554Updated this week
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆297Updated 3 weeks ago
- A humble, and 𝗳𝗮𝘀𝘁, security-oriented HTTP headers analyzer.☆329Updated last week
- Analyze pcaps with Zeek and a Grafana Dashboard☆182Updated last year
- reverse shell using curl☆207Updated 6 months ago
- Passive hostname, domain and IP lookup tool for non-robots☆1,571Updated 3 weeks ago
- Tunnel TCP connections through a file☆952Updated this week
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆258Updated 3 months ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆232Updated 6 months ago
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆664Updated last month
- Linux Security and Monitoring Scripts☆325Updated 10 months ago
- FlowAnalyzer is a tool to help in testing and analyzing OAuth 2.0 Flows, including OpenID Connect (OIDC).☆179Updated last year
- APIDetector: Efficiently scan for exposed Swagger endpoints across web domains and subdomains. Supports HTTP/HTTPS, multi-threading, and …☆335Updated 4 months ago