blackhatethicalhacking / cve-bin-tool
This tool scans for a number of common, vulnerable components (openssl, libpng, libxml2, expat and a few others) to let you know if your system includes common libraries with known vulnerabilities.
☆16Updated 3 years ago
Related projects: ⓘ
- Virtual Security Operations Center☆49Updated last year
- repository containing some nmap scripts☆11Updated 3 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆28Updated 2 years ago
- ☆11Updated 3 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Image Payload Creating/Injecting tools☆12Updated 3 years ago
- ☆14Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- Extract credentials from lsass remotely☆16Updated 4 years ago
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆13Updated 4 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 4 years ago
- A simple script that generates an Excel friendly CSV file from an Amass JSON file.☆13Updated 2 years ago
- An nmap script to produce target lists for use with various tools.☆33Updated 3 years ago
- A collection of tools for managing and automating vulnerability management.☆13Updated 2 years ago
- A library that scrapes Linkedin for user data☆22Updated 3 years ago
- Bulk hostname lookup using shodan☆15Updated 2 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Updated 2 years ago
- Docker container escape enumeration tool.☆10Updated 3 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 3 years ago
- An advanced multithreaded admin panel finder written in python.☆13Updated 3 years ago
- Security checks for your researches☆33Updated 3 years ago
- Resources for AD penetration testing and security☆29Updated 2 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆38Updated last year
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆52Updated 3 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆29Updated last year
- ☆40Updated 5 months ago
- ☆21Updated 4 years ago
- ReconPal: Leveraging NLP for Infosec☆54Updated 2 years ago
- Enumerate AWS permissions and resources.☆62Updated 2 years ago
- ☆17Updated this week