A Vulnerablity Radar That Runs With GIthub Actions
☆44Feb 27, 2026Updated this week
Alternatives and similar repositories for VulnRadar
Users that are interested in VulnRadar are comparing it to the libraries listed below
Sorting:
- This repository provides a comprehensive collection of Pulumi scenarios utilized by cnappgoat☆21Jan 28, 2025Updated last year
- Attempt zone transfers on domains☆18Jul 12, 2021Updated 4 years ago
- ☆15Sep 21, 2019Updated 6 years ago
- AWS Access Review is a comprehensive, zero-configuration security assessment tool that automatically evaluates your AWS environment for p…☆23Apr 6, 2025Updated 10 months ago
- ☆10Feb 23, 2026Updated last week
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Nov 12, 2023Updated 2 years ago
- Repository for CoSAI Workstream 4, Secure Design Patterns for Agentic Systems☆88Feb 13, 2026Updated 2 weeks ago
- ☆37Dec 3, 2024Updated last year
- use at your own risk☆37Nov 23, 2019Updated 6 years ago
- CVE-2024-21306 BadBlue implementation (Using DuckyScript)☆10Jul 11, 2024Updated last year
- ☆10Oct 22, 2017Updated 8 years ago
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆10Aug 4, 2021Updated 4 years ago
- Import Nmap scans to Cherrytree☆36Jul 4, 2022Updated 3 years ago
- Collection of exploits developed by your friendly clown☆15Oct 18, 2025Updated 4 months ago
- BeeXSS is a specialized automated tool designed to detect Blind XSS (Cross-Site Scripting) vulnerabilities in web applications.☆37Dec 3, 2024Updated last year
- Open Data and sources for OSINT in Tajikistan☆13Jan 17, 2025Updated last year
- Crawler based on a modified browser to detect online tracking.☆11Jul 19, 2023Updated 2 years ago
- A Repository for Miscellaneous Scripts☆11Jul 18, 2014Updated 11 years ago
- Before using Emagnet, please remember that with great power comes great responsibility.☆22Mar 30, 2025Updated 11 months ago
- A running list of applications and processes that just do not work with the total absence of IPv4 on on a host☆15Aug 5, 2023Updated 2 years ago
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 3 months ago
- A presentation on shell scripts written in shell scripts.☆11Sep 20, 2024Updated last year
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆64Jan 21, 2025Updated last year
- scripts to automate configuration tasks in Fortigate☆10May 1, 2015Updated 10 years ago
- ☆11Mar 21, 2020Updated 5 years ago
- 403 Bypasser With auto payload generation☆12Aug 8, 2024Updated last year
- A cross-platform, collaborative C2 for red-teaming. Agents are cross-compilable (e.g, you can generate Windows DLLs on Linux), cross-comp…☆24Mar 7, 2025Updated 11 months ago
- PolyCaptcha is a Flask‑based web application that mimics Google’s image‑based reCAPTCHA flow to demonstrate how attackers can use visual …☆10Jul 24, 2025Updated 7 months ago
- CLI for rendering text with headless chrome.☆11Jul 11, 2020Updated 5 years ago
- Content from THOTCON 0xa talk☆10May 5, 2019Updated 6 years ago
- Tools for attacking Computer Use Agents☆21Jan 16, 2026Updated last month
- Docker Version of Aquatone☆14May 21, 2018Updated 7 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- Pentest utils☆14Oct 8, 2016Updated 9 years ago
- A quick way to perform a bulk whois query. Utilizes Team Cymru's service. Requires netcat.☆11Feb 11, 2012Updated 14 years ago
- Simple web based Messaging app built with Nodejs.☆16Feb 1, 2023Updated 3 years ago
- Python script that types out the text that exists in clipboard.☆12Mar 31, 2025Updated 11 months ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- Whether you're a seasoned expert or a beginner, Kali GPT helps streamline your workflow, making penetration testing more efficient and ac…☆20Feb 9, 2026Updated 3 weeks ago