google / tsunami-security-scannerLinks
Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.
☆8,530Updated last week
Alternatives and similar repositories for tsunami-security-scanner
Users that are interested in tsunami-security-scanner are comparing it to the libraries listed below
Sorting:
- This project aims to provide a central repository for many useful Tsunami Security Scanner plugins.☆986Updated last week
- A pretty sweet vulnerability scanner☆4,147Updated last year
- A Workflow Engine for Offensive Security☆5,998Updated 4 months ago
- In-depth attack surface mapping and asset discovery☆13,902Updated 3 weeks ago
- ☆2,664Updated last year
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,442Updated 2 months ago
- Infection Monkey - An open-source adversary emulation platform☆6,916Updated 7 months ago
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆26,135Updated this week
- Ah shhgit! Find secrets in your code. Secrets detection for your GitHub, GitLab and Bitbucket repositories.☆3,933Updated 9 months ago
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆25,166Updated 6 months ago
- Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices☆11,867Updated this week
- A collection of all the data i could extract from 1 billion leaked credentials from internet.☆3,208Updated 5 years ago
- A Tool for Domain Flyovers☆5,889Updated 3 years ago
- Nikto web server scanner☆9,928Updated last month
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆7,077Updated last year
- Open Source Vulnerability Management Platform☆6,066Updated 2 weeks ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,455Updated 8 months ago
- Attack Surface Management Platform☆9,278Updated 2 months ago
- The fastest and complete solution for domain recognition. Supports screenshoting, port scan, HTTP check, data import from other tools, su…☆3,649Updated this week
- Scalable fuzzing infrastructure.☆5,501Updated this week
- Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and sys…☆14,978Updated last month
- Fast passive subdomain enumeration tool.☆12,724Updated last week
- WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆6,088Updated 3 months ago
- An HTTP toolkit for security research.☆9,035Updated 10 months ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆8,661Updated 3 weeks ago
- Advanced vulnerability scanning with Nmap NSE☆3,698Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆15,242Updated this week
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,834Updated 3 years ago
- Real-time HTTP Intrusion Detection☆3,074Updated last year
- Automated All-in-One OS Command Injection Exploitation Tool.☆5,556Updated this week