google / plusfish
Plusfish is a classic web application vulnerability scanner/fuzzer and aimed at security professionals
☆28Updated 2 years ago
Alternatives and similar repositories for plusfish:
Users that are interested in plusfish are comparing it to the libraries listed below
- ☆33Updated last week
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 2 years ago
- ☆43Updated 9 months ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 3 years ago
- Open YARA scan- and search engine☆20Updated last month
- Public repository for Red Canary Research☆37Updated 4 years ago
- Static Token And Credential Scanner☆95Updated last year
- Automated dynamic security analysis by emulation of IoT firmware images in CI-pipelines.☆11Updated 3 years ago
- ☆19Updated 2 years ago
- Cryptovenom: The Cryptography Swiss Army Knife☆9Updated 5 years ago
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆59Updated last month
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆99Updated last year
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- CveXplore☆35Updated 5 months ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- OSS-Fuzz vulnerabilities for OSV.☆144Updated this week
- CVE.ICU code.☆38Updated this week
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆74Updated last year
- Polyglot detector☆21Updated 9 months ago
- ☆10Updated last month
- ☆59Updated 2 years ago
- Malicious Microsoft Office document analyzer☆65Updated last year
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 2 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Updated 2 years ago
- ☆44Updated 3 years ago
- Read only mirror - No pull requests☆18Updated 3 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆19Updated 4 years ago
- Pattern recognition for hosts, services, and content☆13Updated 2 years ago
- A community collection of security reviews of open source software components.☆92Updated 10 months ago
- ☆10Updated last year