blackhatethicalhacking / cve-bin-toolLinks
This tool scans for a number of common, vulnerable components (openssl, libpng, libxml2, expat and a few others) to let you know if your system includes common libraries with known vulnerabilities.
☆16Updated 4 years ago
Alternatives and similar repositories for cve-bin-tool
Users that are interested in cve-bin-tool are comparing it to the libraries listed below
Sorting:
- ☆12Updated 5 years ago
- Bulk hostname lookup using shodan☆14Updated 3 years ago
- ☆36Updated 3 years ago
- Image Payload Creating/Injecting tools☆13Updated 4 years ago
- Virtual Security Operations Center☆52Updated 2 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆50Updated 2 weeks ago
- ☆34Updated 2 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆21Updated 4 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- Files for my Python3 Create Your Own Tool Series☆25Updated 3 years ago
- Google Meet Phishing Template For Gophish☆47Updated 3 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 4 years ago
- A toolkit to attack Office365☆16Updated 6 years ago
- Commands used in Windows penetration tests☆55Updated last month
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆55Updated 4 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆75Updated last year
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Updated 8 months ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated 2 years ago
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆29Updated 2 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 5 years ago
- ☆70Updated 2 years ago
- POC code to explore phishing attacks using OAuth 2.0 authorization flows, such as the device authorization grant.☆35Updated 4 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆20Updated 2 years ago
- a drop-in replacement for Nmap powered by shodan.io☆10Updated 3 years ago
- ☆24Updated 6 years ago
- A tool to assist in the development of landing pages for phishing campaigns☆16Updated 3 years ago
- Shodan Monitoring integration for TheHive.☆131Updated last year
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago