blackhatethicalhacking / cve-bin-toolLinks
This tool scans for a number of common, vulnerable components (openssl, libpng, libxml2, expat and a few others) to let you know if your system includes common libraries with known vulnerabilities.
☆16Updated 4 years ago
Alternatives and similar repositories for cve-bin-tool
Users that are interested in cve-bin-tool are comparing it to the libraries listed below
Sorting:
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- ☆12Updated 4 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆31Updated 3 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆21Updated 4 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 4 years ago
- Image Payload Creating/Injecting tools☆13Updated 4 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Virtual Security Operations Center☆50Updated last year
- AWS Security Tool☆30Updated last year
- Jumpstart multiple WebSocket servers quickly☆31Updated 3 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- Python script that runs Masscan against an IP to collect open ports, feed those ports to Nmap, which finds service versions and runs defa…☆23Updated 3 years ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 11 months ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 5 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆20Updated last month
- A steampipe plugin to query projectdiscovery.io tools.☆26Updated 11 months ago
- OWASP Foundation Web Respository☆36Updated 3 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated 2 years ago
- ☆57Updated 2 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- Tool to automate corporate network segmentation test☆20Updated 4 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Bulk hostname lookup using shodan☆15Updated 3 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆28Updated last year
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆11Updated 3 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago