Plazmaz / CVEStack
Scan products in your stack for known vulnerabilities
☆11Updated last year
Related projects ⓘ
Alternatives and complementary repositories for CVEStack
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 2 years ago
- CVE Vulnerability scanner of your software bill of materials (SBOM). ASCII text input.☆17Updated 4 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- Collection of exploits that were verified by an automated system☆13Updated 3 years ago
- A tool to run a command when the target of a symlink changes☆15Updated 8 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆20Updated 3 years ago
- Fork of https://github.com/PortSwigger/param-miner for header smuggling research☆12Updated 3 years ago
- Standardizing Security Titles☆13Updated last year
- Extract root domain, subdomain name, and tld from a url, using the Public Suffix List.☆8Updated 2 years ago
- OpenSSF Project Template☆17Updated 11 months ago
- introduction to distributed scanning using vultr☆11Updated 7 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated last year
- A tool to run nmap against each line in a script.☆16Updated 3 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- Postman Integration is an extension for burp to generate Postman collection fomat json file.☆19Updated 2 years ago
- Create machine images containing the Nessus vulnerability scanner☆11Updated 3 weeks ago
- Developper-proof prevention of SQL injection (java library)☆11Updated 3 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆12Updated 2 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- A formula to calculate bounty amounts.☆13Updated 6 years ago
- A python network scanner using scapy☆20Updated 4 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆12Updated 2 years ago
- A port scanner written in PowerShell☆13Updated 3 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 3 years ago
- Create an AMI with CobaltStrike and related tools.☆8Updated 3 months ago
- PoC: Python package static and dynamic analysis to detect environment variable stealing☆10Updated 3 years ago