canonical / ubuntu-security-noticesLinks
☆17Updated this week
Alternatives and similar repositories for ubuntu-security-notices
Users that are interested in ubuntu-security-notices are comparing it to the libraries listed below
Sorting:
- FastCVE: A Dockerized CVE search tool with API and CLI support for security vulnerability queries.☆52Updated 3 weeks ago
- Jumpstart multiple WebSocket servers quickly☆31Updated 3 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆20Updated last month
- Static Token And Credential Scanner☆96Updated 2 years ago
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆27Updated last year
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 3 years ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Updated 3 months ago
- Paramalyzer - Burp extension for parameter analysis of large-scale web application penetration tests.☆33Updated 2 years ago
- Inspired by gowitness and EyeWitness☆14Updated 3 months ago
- Additional active scan checks for BURP☆27Updated 8 months ago
- TunnelX is a lightweight ingress tunneling tool designed to create a secure SOCKS5 proxy server for routing network traffic.☆46Updated 2 weeks ago
- MyOpenVDP is a free web application to install a vulnerability disclosure policy or a vulnerability disclosure program on your assets. (V…☆29Updated 10 months ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 9 months ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- Do bulk whois lookups and get alerted on domains of interest.☆36Updated 10 months ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14Updated 2 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆59Updated last year
- Signatures for wraith used to detect secrets across various sources☆15Updated 2 years ago
- ☆12Updated 3 months ago
- Collection of Semgrep rules for security analysis☆10Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated last year
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Updated 9 months ago
- Validate proxies for specific domain☆36Updated 3 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated 2 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- ☆14Updated last year
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Updated 2 years ago
- Ffuf output browser☆39Updated 2 years ago
- ☆17Updated 3 years ago