This script searches NVD's website for new CVES, alerting you by email or telegram. You can configure a list of products that interest you or receive from all vulnerabilities.
☆11Mar 21, 2021Updated 5 years ago
Alternatives and similar repositories for VulnAlert
Users that are interested in VulnAlert are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- parse ffuf & map endpoints to wordlists☆21Feb 25, 2021Updated 5 years ago
- Demo code illustrating how to do an autocomplete dropdown inside a textarea with Algolia☆21Mar 4, 2023Updated 3 years ago
- Authenticate users through node using WordPress cookies☆14Feb 5, 2026Updated last month
- ☆11Jan 24, 2023Updated 3 years ago
- experimental H5P content for automated feedback on texts☆17Mar 4, 2026Updated 3 weeks ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆19Jun 29, 2018Updated 7 years ago
- Códigos-fonte e projetos do meu livro Node.js e Microservices.☆18Jun 26, 2025Updated 9 months ago
- Queries for Carbon Black Response☆11Feb 11, 2020Updated 6 years ago
- tl;tr; jhaddix bhmv5☆10Jul 2, 2020Updated 5 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆10Jun 28, 2020Updated 5 years ago
- Get new vulnerability alerts daily straight to your slack channel using GitHub Actions.☆16Jan 15, 2026Updated 2 months ago
- ☆23Jan 8, 2026Updated 2 months ago
- WiP - cve-search next gen☆13Jan 18, 2020Updated 6 years ago
- The RedHerring plugin is an extension for the CTFd platform that introduces a new type of challenge. It aims to promote fairness and prev…☆13Sep 6, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A collection of open source and commercial tools that aid in red team operations.☆10Jun 12, 2019Updated 6 years ago
- Udemy Rails API course☆28Mar 24, 2020Updated 6 years ago
- A simple and basic library mangement system that is created using Python and stores data in a very basic log file.☆16Jul 10, 2021Updated 4 years ago
- Leverage the Intel® Distribution of OpenVINO™ Toolkit to fast-track development of high-performance computer vision and deep learning inf…☆10Jul 28, 2020Updated 5 years ago
- Repo of RIT CCDC Team Scripts☆14Mar 28, 2022Updated 3 years ago
- PrettyRecon-cli is an unofficial cli client for PrettyRecon. This tool can be used to trigger various tasks on prettyrecon as well as fe…☆10May 9, 2025Updated 10 months ago
- BuckeyeCTF 2023 Challenges☆18Oct 2, 2025Updated 5 months ago
- Twitter Bot to perform advanced search and automated response☆13Dec 22, 2017Updated 8 years ago
- Machine Learning-based tool for Cybersecurity Risk Assessment☆12Jul 18, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Aug 31, 2020Updated 5 years ago
- generate git commits with custom sha prefixes☆19Nov 1, 2022Updated 3 years ago
- RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you vis…☆25Nov 12, 2025Updated 4 months ago
- Application scanning component of OWASP PurpleTeam☆15Feb 12, 2023Updated 3 years ago
- Extract domains/subdomains/FQDNs from files and URLs☆19Jun 30, 2020Updated 5 years ago
- Simple demo using "behave" and "pyspark" libraries to test data transformations in a human-readable way☆10Apr 5, 2019Updated 6 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆34Aug 28, 2023Updated 2 years ago
- ☆38Nov 27, 2020Updated 5 years ago
- ☆13Jul 12, 2025Updated 8 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Create LAMP Stack using terraform with AWS☆11Feb 15, 2023Updated 3 years ago
- A modular URL deduplication tool.☆19Feb 19, 2025Updated last year
- AWS CIS Controls module for terraform☆11Nov 16, 2023Updated 2 years ago
- ☆33Jun 19, 2021Updated 4 years ago
- The external file loader package makes it easy to load external js and css files dynamically within Meteor.☆69Sep 21, 2013Updated 12 years ago
- This batch script file wants to check your EDR systems detection and response capabilities in a more noisy way!☆12Jul 3, 2020Updated 5 years ago
- It is a desktop program designed using Java (Swing) to provide communication and synchronization between employees for small companies. @…☆10Mar 12, 2021Updated 5 years ago