Ostorlab / KEVLinks
Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's Asteroid and Bug Bounty programs.
☆590Updated last month
Alternatives and similar repositories for KEV
Users that are interested in KEV are comparing it to the libraries listed below
Sorting:
- OXO is a security scanning orchestrator for the modern age.☆558Updated this week
- A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot), sqlite, excel and d2-lang. Simply put it's n…☆710Updated 2 weeks ago
- ☆314Updated 4 months ago
- LDAP Watchdog: A real-time linux-compatible LDAP monitoring tool for detecting directory changes, providing visibility into additions, mo…☆190Updated 7 months ago
- CI/CD Security Analyzer☆702Updated 8 months ago
- GitHub Actions Pipeline Enumeration and Attack Tool☆712Updated last month
- Galah: An LLM-powered web honeypot.☆608Updated 3 months ago
- Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.☆1,271Updated 3 months ago
- A flexible threat detection platform that simplifies rule management and deployment using K8s CronJob and Helm, but can also run standalo…☆383Updated last year
- Credentials Dumper for Linux using eBPF☆1,150Updated last year
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆312Updated last month
- A humble, and 𝗳𝗮𝘀𝘁, security-oriented HTTP headers analyzer.☆344Updated last week
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆730Updated last month
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆461Updated last year
- Pen Test Report Generation and Assessment Collaboration☆572Updated this week
- ☆573Updated 2 years ago
- Private key usage verification☆432Updated 7 months ago
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆398Updated last week
- An Open Letter to the OWASP Board☆107Updated 2 years ago
- ☆521Updated 9 months ago
- reverse shell using curl☆218Updated 8 months ago
- Tunnel TCP connections through a file☆967Updated this week
- Deep Linux runtime visibility meets Wireshark☆295Updated 3 months ago
- A repo to conduct vulnerability enrichment.☆692Updated this week
- Customized CVE FEED Notifier☆114Updated 6 months ago
- Differential testing framework for HTTP implementations☆902Updated last month
- Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.☆556Updated last week
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆809Updated 8 months ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆227Updated 5 months ago
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,288Updated 3 months ago