ajread4 / nessus_crosswalkView external linksLinks
Crosswalk Nessus findings with the CISA Known and Exploited Vulnerabilities (KEV) catalog.
☆12Mar 21, 2023Updated 2 years ago
Alternatives and similar repositories for nessus_crosswalk
Users that are interested in nessus_crosswalk are comparing it to the libraries listed below
Sorting:
- AWS Testing and Reporting Management Tool☆20Jan 23, 2023Updated 3 years ago
- Exploit of RealVNC VNC Server☆27Oct 18, 2022Updated 3 years ago
- DeltaV™ Edge Environment provides easy and secure access to DeltaV data for use on premise or in the cloud for monitoring, analytics, rep…☆11Nov 24, 2025Updated 2 months ago
- ESPHome component for reading/writing information to Broan ERVs via serial☆23Jan 8, 2026Updated last month
- Creates a malicious ODF document help leak NetNTLM Creds☆37Jul 12, 2023Updated 2 years ago
- 紫菜鱼的网络安全扫描器☆11Dec 19, 2023Updated 2 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- Dump certificates from PE files in different formats☆38Dec 25, 2023Updated 2 years ago
- ☆43Jul 6, 2022Updated 3 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- A titanium mobile app for iPhone and android to display current local weather.☆19Jun 11, 2013Updated 12 years ago
- Titanium MVC Example☆20Jun 29, 2011Updated 14 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆98Apr 13, 2023Updated 2 years ago
- GET-ACQ is a python tool used to gather all companies acquired by a given company domain name. It is done by calling SecurityTrails API.☆12Nov 10, 2021Updated 4 years ago
- ☆12Jan 28, 2023Updated 3 years ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- A cybersecurity dataset consisting of 4.3 million entries of Twitter, Blogs, Paper, and CVEs☆20May 26, 2023Updated 2 years ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆16Aug 5, 2025Updated 6 months ago
- Priv8 Tools Software Mass Dork Auto Exploit.☆13Feb 1, 2023Updated 3 years ago
- It provides configurable shortcuts to help make the pre-qual/testing process more efficient.☆11Nov 19, 2022Updated 3 years ago
- Chef Cookbook for applying CIS Benchmark settings to Windows 10 systems☆14Aug 5, 2018Updated 7 years ago
- ☆11Feb 21, 2012Updated 13 years ago
- CMSC389R course at UMD☆10Oct 2, 2019Updated 6 years ago
- A set of scripts to help automate the management of Burp Collaborator☆12Sep 5, 2025Updated 5 months ago
- An Ansible Role that installs ADCS on Windows Server and optionally configures Certified Preowned templates.☆17Jan 22, 2026Updated 3 weeks ago
- Single Context Example App - Titanium☆17Sep 7, 2011Updated 14 years ago
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- ☆10Aug 17, 2021Updated 4 years ago
- https://z-r0crypt.github.io☆11May 3, 2024Updated last year
- Chef Cookbook for applying CIS Benchmark settings to Windows 2016 systems☆13May 23, 2019Updated 6 years ago
- ☆13Mar 27, 2021Updated 4 years ago
- ☆12Jan 8, 2026Updated last month
- ☆110Feb 21, 2023Updated 2 years ago
- ☆60May 25, 2023Updated 2 years ago
- Near compile-time string obfuscation for Golang☆13Oct 3, 2023Updated 2 years ago
- You can check below blog post on attacks related to azure storage.☆13Apr 8, 2021Updated 4 years ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- ☆14Sep 26, 2023Updated 2 years ago