Simple REST-style web service for the CVE searching
☆97May 19, 2023Updated 2 years ago
Alternatives and similar repositories for cve_server
Users that are interested in cve_server are comparing it to the libraries listed below
Sorting:
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆35Apr 16, 2015Updated 10 years ago
- Inject beef hooks into HTTP traffic and track hooked systems from cmdline☆125Apr 12, 2015Updated 10 years ago
- Oracle Database 12c password brute forcer☆29Jun 18, 2015Updated 10 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Dec 6, 2010Updated 15 years ago
- SpiderLabs shared Nmap Tools☆231Aug 7, 2020Updated 5 years ago
- Set of test cases that can be used to test custom implementations of the SecRules language (ModSecurity rules format).☆17Feb 25, 2025Updated last year
- ☆29May 4, 2021Updated 4 years ago
- multiple password 'asher using Python’s hashlib☆15Mar 24, 2021Updated 4 years ago
- Set of CLI tools to transform ModSecurity logs into a meaningful information, given a context.☆52May 5, 2023Updated 2 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- The ModSecurity Pcap Connector☆27Jan 13, 2016Updated 10 years ago
- The Magical Code Injection Rainbow! MCIR is a framework for building configurable vulnerability testbeds. MCIR is also a collection of co…☆447Aug 7, 2020Updated 5 years ago
- TCP session interception and injection framework☆55Mar 22, 2011Updated 14 years ago
- Small snippets of code we often find useful☆11Nov 9, 2019Updated 6 years ago
- Net::TNS, a Ruby library for connecting to Oracle databases.☆35May 7, 2019Updated 6 years ago
- TomcatBrute tool☆12Nov 4, 2016Updated 9 years ago
- 一次通过 DNS 来实现部分区域 XSS 防护的简单尝试。☆11Sep 26, 2016Updated 9 years ago
- A JBoss script for obtaining remote shell access☆177Aug 7, 2020Updated 5 years ago
- Public exploits☆16May 28, 2018Updated 7 years ago
- Ruby bindings for the yara file analysis and classification library☆27Aug 26, 2011Updated 14 years ago
- Flash crossdomain policy security checker☆25Oct 3, 2015Updated 10 years ago
- Wireless Hacking, WiFi Security, Vulnerability Analyzer, Pentestration☆12Dec 19, 2016Updated 9 years ago
- DNS Sub-domain brute forcer, in Python + gevent☆50Dec 9, 2016Updated 9 years ago
- A Java Server Faces (JSF) testing tool for decoding view state and creating view state attack vectors.☆32Dec 7, 2010Updated 15 years ago
- ☆11Apr 28, 2017Updated 8 years ago
- This version touches disk for registry persistence.☆27Oct 6, 2015Updated 10 years ago
- ☆46Sep 28, 2017Updated 8 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Aug 9, 2013Updated 12 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Sep 2, 2013Updated 12 years ago
- "Broken NAT" - A suite of tools focused on detecting and interacting with publicly available BNAT scenerios☆25Aug 17, 2014Updated 11 years ago
- NmapPy - Python implementation of Nmap☆35Nov 27, 2018Updated 7 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- ICS/SCADA/PLC Discovery Tools Releases☆40Mar 4, 2015Updated 11 years ago
- Cloned from now gone Digitalbond page.☆15Aug 23, 2016Updated 9 years ago
- A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network☆573Dec 9, 2017Updated 8 years ago
- This cookbook installs Nexpose☆13Dec 15, 2023Updated 2 years ago
- µphisher spear phishing tool (reference implementation)☆40Jun 26, 2020Updated 5 years ago
- security course list☆14Sep 18, 2015Updated 10 years ago
- Updated version of the 2010 KoreLogic password cracking rules for John the Ripper☆63Sep 27, 2012Updated 13 years ago