Agent responsible for network discovery and security auditing using Nmap.
☆23Apr 21, 2026Updated 2 weeks ago
Alternatives and similar repositories for agent_nmap
Users that are interested in agent_nmap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ostorlab Github Actions to complement your CI/CD with Security Testing.☆21Oct 2, 2025Updated 7 months ago
- Agent responsible for fast vulnerability scanning using Nuclei.☆11Apr 20, 2026Updated 2 weeks ago
- OXO is a security scanning orchestrator for the modern age.☆568Updated this week
- ☆13Sep 22, 2022Updated 3 years ago
- ☆15Dec 7, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- pocframe是一个基于python3的开源批量POC检测框架,默认使用协程异步请求,支持多线程并发,支持多种指定目标方式,可用于批量POC检测,也可根据需要扩展功能。☆13Mar 20, 2021Updated 5 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- ☆57Mar 6, 2026Updated 2 months ago
- ☆11Sep 28, 2017Updated 8 years ago
- orgleaks is a tool to run gitleaks for an organization.☆11Oct 19, 2021Updated 4 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- Simulation of manufacturing systems☆15Mar 15, 2022Updated 4 years ago
- IT Risk Management tools☆16Apr 4, 2025Updated last year
- 多模式正则匹配☆15Aug 15, 2018Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- FACT analysis plug-in that maps software version to cves☆13Nov 14, 2019Updated 6 years ago
- Presentation Slides and Resources☆16Jun 12, 2024Updated last year
- Improves vulnerability prioritization by enhancing CVSS scores with exploit intelligence. Combines data from CISA KEV, EPSS, Metasploit, …☆14Updated this week
- ☆31Feb 24, 2021Updated 5 years ago
- Safety Risk Reliability Model Library☆12Jan 23, 2025Updated last year
- ☆14Jun 1, 2023Updated 2 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆12May 29, 2017Updated 8 years ago
- Everything related to Cobalt Strike☆15Feb 3, 2020Updated 6 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆17Feb 11, 2017Updated 9 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Manage the results of the qualitative risk analysis, quantitative risk analysis, and risk response planning.☆13Jul 16, 2025Updated 9 months ago
- Simulating Industrial IoT with IGSS SCADA and Rasberry Pi, Attacking and fixing potential vulnerabilities☆13Jun 7, 2020Updated 5 years ago
- The CSET, Malcom, Con-PCA suite of tools☆13Mar 7, 2023Updated 3 years ago
- ☆17Nov 3, 2017Updated 8 years ago
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for t…☆15Jun 3, 2016Updated 9 years ago
- 🚗 A curated list of resources for learning about vehicle security and car hacking☆15Oct 4, 2021Updated 4 years ago
- ReSonate: A framework for runtime risk assessment of autonomous cyber-physical systems☆11Jul 4, 2021Updated 4 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆23Jan 1, 2023Updated 3 years ago
- A Microsoft Threat Modelling tool template for ICS threat modelling☆13Aug 20, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 🎓Materials for the Hands-On Introduction to OpenFAIR Risk Analysis with Tidyrisk☆14Jan 22, 2021Updated 5 years ago
- Open-source, enterprise-grade threat modeling platform☆78Updated this week
- A lua plugin for Wireshark which contains dissectors for common maritime protocols.☆18Mar 24, 2026Updated last month
- A Smart Log4Shell/Log4j/CVE-2021-44228 Scanner☆14Dec 22, 2021Updated 4 years ago
- This is the Network Flow Generator for ICSSIM☆18Aug 28, 2025Updated 8 months ago
- Cloud security documents and tools to assist with conducting risk assessments that conform to the ICS62443 guidelines☆13Mar 20, 2026Updated last month
- Quantitative Risk Management Concepts☆12Sep 27, 2016Updated 9 years ago