blackhatethicalhacking / cve-bin-toolLinks
This tool scans for a number of common, vulnerable components (openssl, libpng, libxml2, expat and a few others) to let you know if your system includes common libraries with known vulnerabilities.
☆16Updated 4 years ago
Alternatives and similar repositories for cve-bin-tool
Users that are interested in cve-bin-tool are comparing it to the libraries listed below
Sorting:
- Extract credentials from lsass remotely☆16Updated 5 years ago
- ☆12Updated 4 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- Virtual Security Operations Center☆50Updated last year
- A post exploitation framework designed to operate covertly on heavily monitored environments☆21Updated 4 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆18Updated 4 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Bulk hostname lookup using shodan☆15Updated 3 years ago
- A library that scrapes Linkedin for user data☆23Updated 4 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Updated 3 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 5 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- A repository of compiled and ready-to-use shells for Windows restricted environments.☆36Updated 5 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆16Updated 5 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 6 months ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 4 years ago
- An nmap script to produce target lists for use with various tools.☆33Updated 4 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆59Updated last year
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆20Updated 3 years ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- ☆36Updated 3 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 10 months ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated last year
- Automatically deploy preconfigured SSL ready GoPhish instances into Azure using Terraform.☆17Updated 4 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- ☆20Updated 2 years ago
- scripts to setup environments for red/blue teams.☆16Updated last year