Ostorlab / KEV
Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's Asteroid and Bug Bounty programs.
☆557Updated last week
Alternatives and similar repositories for KEV:
Users that are interested in KEV are comparing it to the libraries listed below
- OXO is a security scanning orchestrator for the modern age.☆533Updated this week
- A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot), sqlite, excel and d2-lang. Simply put it's n…☆663Updated last month
- ☆293Updated 5 months ago
- A flexible threat detection platform that simplifies rule management and deployment using K8s CronJob and Helm, but can also run standalo…☆369Updated 3 months ago
- GitHub Actions Pipeline Enumeration and Attack Tool☆580Updated 5 months ago
- CI/CD Security Analyzer☆643Updated 3 months ago
- LDAP Watchdog: A real-time linux-compatible LDAP monitoring tool for detecting directory changes, providing visibility into additions, mo…☆181Updated last year
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆656Updated 3 months ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆122Updated 3 months ago
- Galah: An LLM-powered web honeypot.☆461Updated 3 months ago
- Tools to assess DNS security.☆151Updated 10 months ago
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆448Updated 10 months ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆216Updated last month
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆223Updated 4 months ago
- Automatically detect potential vulnerabilities and analyze repository metrics to prioritize open source security research targets☆205Updated 2 months ago
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆557Updated last week
- Identify hardcoded secrets in static structured text (version 2)☆90Updated this week
- Differential fuzzing REPL for HTTP implementations.☆731Updated 3 weeks ago
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆329Updated 2 months ago
- cloudgrep is grep for cloud storage☆324Updated last month
- Pen Test Report Generation and Assessment Collaboration☆460Updated 2 weeks ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆266Updated 2 months ago
- A repo to conduct vulnerability enrichment.☆538Updated this week
- An offensive data enrichment pipeline☆642Updated this week
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆152Updated 4 months ago
- APIDetector: Efficiently scan for exposed Swagger endpoints across web domains and subdomains. Supports HTTP/HTTPS, multi-threading, and …☆309Updated 2 months ago
- Halberd : Multi-Cloud Attack Platform☆241Updated last week
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆507Updated 3 weeks ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆163Updated 8 months ago
- Private key usage verification☆421Updated last month