PeterMosmans / vulnerability-alerterLinks
Scrapes information on vulnerabilities from US-CERT and parses them for further usage
☆17Updated 5 years ago
Alternatives and similar repositories for vulnerability-alerter
Users that are interested in vulnerability-alerter are comparing it to the libraries listed below
Sorting:
- Six Degrees of Domain Admin☆15Updated 8 years ago
- Simple website to display the LAN status based on a nmap scan☆58Updated 3 years ago
- ☆61Updated 7 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Updated 6 years ago
- Docker container for datasploit framework☆25Updated 8 years ago
- A few transforms and a machine for parsing Nmap XML results☆39Updated 9 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 9 years ago
- Automated Security Assessment Reporting Tool☆37Updated 8 years ago
- This tool is based on regex with effective standards for detecting phishing sites in real time using certstream and can also detect puny…☆81Updated 7 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 10 years ago
- This tool helps you pentest THE PAST of a website.☆15Updated 5 months ago
- Digital Forensics and Incident Response Wiki☆40Updated 11 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 6 years ago
- scripts for pentesting☆86Updated 7 years ago
- A collection of useful scripts for penetration testers☆83Updated 13 years ago
- Pillage is a multithreaded enumeration python script I created for the enumeration phase of penetration tests.☆26Updated 8 years ago
- Docker repository for OWTF (64-bit Kali)☆33Updated 2 months ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- Automated enumeration☆30Updated 4 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆67Updated 7 years ago
- The VAPT Toolkit provides a streamlined way to install, configure, and maintain a complete penetration testing environment with 50+ secur…☆31Updated this week
- Mattermost - Shodan Slash command☆31Updated 8 years ago
- Take output from nmap and turn it into something easily searchable and readable.☆34Updated 9 years ago
- Shodan.io connector for Phantom Cyber Security Orchestration☆23Updated 9 years ago
- Encoder, Decoder, Converter, Calculator, TU WAS DU WILLST .. for various codings used in the wild wide web☆41Updated last year
- OSINT Threat Intel Interface - CLI for HoneyDB☆115Updated 6 years ago
- A scripted library of hacking techniques.☆18Updated 7 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆39Updated last year
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆35Updated 9 years ago