Crosswalk Nessus findings with the CISA Known and Exploited Vulnerabilities (KEV) catalog.
☆12Mar 21, 2023Updated 2 years ago
Alternatives and similar repositories for nessus_crosswalk
Users that are interested in nessus_crosswalk are comparing it to the libraries listed below
Sorting:
- AWS Testing and Reporting Management Tool☆20Jan 23, 2023Updated 3 years ago
- Exploit of RealVNC VNC Server☆27Oct 18, 2022Updated 3 years ago
- DeltaV™ Edge Environment provides easy and secure access to DeltaV data for use on premise or in the cloud for monitoring, analytics, rep…☆11Nov 24, 2025Updated 3 months ago
- Creates a malicious ODF document help leak NetNTLM Creds☆38Jul 12, 2023Updated 2 years ago
- ESPHome component for reading/writing information to Broan ERVs via serial☆25Jan 8, 2026Updated last month
- 紫菜鱼的网络安全扫描器☆11Dec 19, 2023Updated 2 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- ☆43Jul 6, 2022Updated 3 years ago
- Dump certificates from PE files in different formats☆38Dec 25, 2023Updated 2 years ago
- Titanium MVC Example☆20Jun 29, 2011Updated 14 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- A titanium mobile app for iPhone and android to display current local weather.☆19Jun 11, 2013Updated 12 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Apr 13, 2023Updated 2 years ago
- ☆11Feb 21, 2012Updated 14 years ago
- A set of scripts to help automate the management of Burp Collaborator☆12Sep 5, 2025Updated 6 months ago
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- CMSC389R course at UMD☆11Oct 2, 2019Updated 6 years ago
- Single Context Example App - Titanium☆17Sep 7, 2011Updated 14 years ago
- ☆13Mar 27, 2021Updated 4 years ago
- A cybersecurity dataset consisting of 4.3 million entries of Twitter, Blogs, Paper, and CVEs☆20May 26, 2023Updated 2 years ago
- Chef Cookbook for applying CIS Benchmark settings to Windows 2016 systems☆13May 23, 2019Updated 6 years ago
- An Ansible Role that installs ADCS on Windows Server and optionally configures Certified Preowned templates.☆17Jan 22, 2026Updated last month
- Priv8 Tools Software Mass Dork Auto Exploit.☆13Feb 1, 2023Updated 3 years ago
- It provides configurable shortcuts to help make the pre-qual/testing process more efficient.☆11Nov 19, 2022Updated 3 years ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- ☆10Aug 17, 2021Updated 4 years ago
- ☆12Jan 28, 2023Updated 3 years ago
- GET-ACQ is a python tool used to gather all companies acquired by a given company domain name. It is done by calling SecurityTrails API.☆12Nov 10, 2021Updated 4 years ago
- Chef Cookbook for applying CIS Benchmark settings to Windows 10 systems☆14Aug 5, 2018Updated 7 years ago
- ☆12Updated this week
- https://z-r0crypt.github.io☆11May 3, 2024Updated last year
- ☆109Feb 21, 2023Updated 3 years ago
- ☆60May 25, 2023Updated 2 years ago
- Near compile-time string obfuscation for Golang☆13Oct 3, 2023Updated 2 years ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- .NET Assembly that creates network shares,sets ACE entries for directories, sets share perms, and deletes shares. Learning project for C#☆10Oct 14, 2024Updated last year
- Slides and demo code for past presentations☆12Feb 17, 2022Updated 4 years ago
- Lists of hacking: Blog, Forums, Telegram channel and all kind of resources in spanish and english.☆15Mar 7, 2021Updated 4 years ago