Ostorlab / KEVLinks
Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's Asteroid and Bug Bounty programs.
☆575Updated last week
Alternatives and similar repositories for KEV
Users that are interested in KEV are comparing it to the libraries listed below
Sorting:
- A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot), sqlite, excel and d2-lang. Simply put it's n…☆686Updated 3 months ago
- OXO is a security scanning orchestrator for the modern age.☆552Updated last week
- ☆293Updated this week
- LDAP Watchdog: A real-time linux-compatible LDAP monitoring tool for detecting directory changes, providing visibility into additions, mo…☆187Updated 3 months ago
- CI/CD Security Analyzer☆659Updated 4 months ago
- GitHub Actions Pipeline Enumeration and Attack Tool☆680Updated 3 weeks ago
- A flexible threat detection platform that simplifies rule management and deployment using K8s CronJob and Helm, but can also run standalo…☆378Updated 9 months ago
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆450Updated last year
- A modular vulnerability scanner with automatic report generation capabilities.☆676Updated this week
- Galah: An LLM-powered web honeypot.☆551Updated last month
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆284Updated 5 months ago
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,098Updated 11 months ago
- Differential testing framework for HTTP implementations☆836Updated this week
- OSINT tool to find informations about a github user (email2username, username2email, creation date ...)☆467Updated 3 months ago
- Pen Test Report Generation and Assessment Collaboration☆536Updated last week
- 💀 Don't fear the Reaper 👻☆553Updated 2 weeks ago
- Tunnel TCP connections through a file☆945Updated 2 weeks ago
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆704Updated 8 months ago
- Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.☆1,192Updated last month
- A humble, and 𝗳𝗮𝘀𝘁, security-oriented HTTP headers analyzer.☆321Updated this week
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆383Updated last week
- Credentials Dumper for Linux using eBPF☆1,144Updated 10 months ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆252Updated 2 months ago
- A repo to conduct vulnerability enrichment.☆651Updated last week
- Passive hostname, domain and IP lookup tool for non-robots☆1,546Updated this week
- Analyze pcaps with Zeek and a Grafana Dashboard☆178Updated last year
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆220Updated last month
- GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.☆376Updated last week
- Private key usage verification☆430Updated 3 months ago
- BLint is a Binary Linter to check the security properties, and capabilities in your executables. Since v2, blint is also an SBOM generato…☆388Updated last month