blackhatethicalhacking / cve-bin-tool
This tool scans for a number of common, vulnerable components (openssl, libpng, libxml2, expat and a few others) to let you know if your system includes common libraries with known vulnerabilities.
☆16Updated 4 years ago
Alternatives and similar repositories for cve-bin-tool:
Users that are interested in cve-bin-tool are comparing it to the libraries listed below
- Virtual Security Operations Center☆50Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 8 months ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- repository containing some nmap scripts☆11Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago
- An nmap script to produce target lists for use with various tools.☆33Updated 3 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- ☆12Updated 4 years ago
- A library that scrapes Linkedin for user data☆23Updated 3 years ago
- A steampipe plugin to query projectdiscovery.io tools.☆26Updated 8 months ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 4 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Files for my Python3 Create Your Own Tool Series☆25Updated 2 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 4 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- Information-Gathering Shell Script☆29Updated 4 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆21Updated 4 years ago
- ☆14Updated 4 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Image Payload Creating/Injecting tools☆12Updated 3 years ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆20Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- A simple script that generates an Excel friendly CSV file from an Amass JSON file.☆13Updated 2 years ago
- A network logging tool that logs per process activities☆32Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year