NERVE Continuous Vulnerability Scanner
☆456Dec 6, 2023Updated 2 years ago
Alternatives and similar repositories for nerve
Users that are interested in nerve are comparing it to the libraries listed below
Sorting:
- fully automated pentesting tool☆518Dec 8, 2022Updated 3 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Oct 9, 2020Updated 5 years ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆69Jul 9, 2025Updated 8 months ago
- Automated rogue access point setup tool.☆204Apr 2, 2021Updated 4 years ago
- Router socks. One port socks for all the others.☆69May 22, 2024Updated last year
- Network footprint scanner platform. Discover domains and run your custom checks periodically.☆429Apr 22, 2022Updated 3 years ago
- automated web assets enumeration & scanning [DEPRECATED]☆288Mar 7, 2023Updated 3 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- ☆46Mar 20, 2021Updated 5 years ago
- A Modern Orchestration Engine for Security☆6,145Mar 13, 2026Updated last week
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆145Updated this week
- Zero Infrastructure Password Cracking☆416Aug 22, 2024Updated last year
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆108Jan 11, 2023Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Sep 25, 2020Updated 5 years ago
- RainbowSQL is very fast dork&SQL injection scanner.☆61Jun 12, 2025Updated 9 months ago
- Web Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security prof…☆417Nov 24, 2020Updated 5 years ago
- The Swiss Army knife for automated Web Application Testing☆2,324May 8, 2024Updated last year
- A tool for bug hunting or pentesting for targeting websites that have open .git repositories available in public☆371Jun 23, 2020Updated 5 years ago
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆227Feb 9, 2021Updated 5 years ago
- An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.☆183Mar 10, 2026Updated last week
- Powerglot encodes offensive powershell scripts using polyglots . Offensive security tool useful for stego-malware, privilege escalation, …☆180Apr 25, 2020Updated 5 years ago
- Linux post exploitation privilege escalation enumeration☆257Aug 20, 2020Updated 5 years ago
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,510Nov 16, 2025Updated 4 months ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Jul 26, 2020Updated 5 years ago
- Simple Live Data Collection Tool☆22Oct 4, 2020Updated 5 years ago
- Security Tool for Reconnaissance and Information Gathering on a website. (python 3.x)☆463Aug 21, 2023Updated 2 years ago
- Fast Modular Web Interfaces Bruteforcer☆225Nov 16, 2021Updated 4 years ago
- 19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS…☆828Aug 8, 2023Updated 2 years ago
- Watcher - Open Source AI-powered Cyber Threat Intelligence & Hunting Platform. Developed with Django & React JS.☆1,254Mar 5, 2026Updated 2 weeks ago
- Vulmap Online Local Vulnerability Scanners Project☆969Mar 18, 2023Updated 3 years ago
- asnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the …☆25Jan 6, 2021Updated 5 years ago
- automated password spraying tool☆148Jun 15, 2021Updated 4 years ago
- A query aggregator for OSINT based threat hunting☆932Mar 7, 2026Updated 2 weeks ago
- network visualization & pentest reporting☆531May 2, 2023Updated 2 years ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆178Nov 10, 2022Updated 3 years ago
- A modular OSINT honeypot for blue teamers☆342May 2, 2023Updated 2 years ago
- Tentacle is a POC vulnerability verification and exploit framework. It supports free extension of exploits and uses POC scripts. It suppo…☆374Mar 6, 2024Updated 2 years ago
- ATTPwn☆218Mar 9, 2024Updated 2 years ago
- ASOC, ASPM, DevSecOps, Vulnerability Management Using ArcherySec.☆2,443Jun 11, 2025Updated 9 months ago