blackhatethicalhacking / cve-bin-tool
This tool scans for a number of common, vulnerable components (openssl, libpng, libxml2, expat and a few others) to let you know if your system includes common libraries with known vulnerabilities.
☆16Updated 4 years ago
Alternatives and similar repositories for cve-bin-tool
Users that are interested in cve-bin-tool are comparing it to the libraries listed below
Sorting:
- ☆12Updated 4 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 5 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- Virtual Security Operations Center☆50Updated last year
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- An nmap script to produce target lists for use with various tools.☆33Updated 4 years ago
- ☆33Updated 3 months ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆14Updated 5 years ago
- ☆57Updated last year
- A library that scrapes Linkedin for user data☆23Updated 4 years ago
- WordPress version identification and vulnerability finder.☆31Updated 2 years ago
- Image Payload Creating/Injecting tools☆13Updated 3 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- ☆22Updated 4 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Collection of Slides From My Conference Talks☆20Updated 2 years ago
- ☆21Updated 2 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆18Updated 4 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 9 months ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- OWASP Foundation Web Respository☆36Updated 3 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆12Updated 6 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Updated 3 years ago
- ReconPal: Leveraging NLP for Infosec☆56Updated 2 years ago
- ☆11Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 5 months ago