Vanir is a source code-based static analysis tool that automatically identifies the list of missing security patches in the target system. By default, Vanir pulls up-to-date CVEs from Open Source Vulnerabilities (OSV) together with their corresponding signatures so that users can transparently scan missing patches for an up-to-date list of CVEs.
☆350Oct 17, 2025Updated 4 months ago
Alternatives and similar repositories for vanir
Users that are interested in vanir are comparing it to the libraries listed below
Sorting:
- OSV-SCALIBR: A library for Software Composition Analysis☆575Updated this week
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 5 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40May 7, 2023Updated 2 years ago
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆42Dec 12, 2024Updated last year
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- LLM powered fuzzing via OSS-Fuzz.☆1,359Feb 12, 2026Updated 2 weeks ago
- A fork of the Go language with some tweaks☆56Jan 29, 2025Updated last year
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated 11 months ago
- ☆75Mar 19, 2025Updated 11 months ago
- Format agnostic SBOM tooling☆132Nov 20, 2025Updated 3 months ago
- ☆76Oct 18, 2025Updated 4 months ago
- A web CTF for training developers in bug hunting and secure coding!☆100Jan 12, 2025Updated last year
- Template Go app repo with local test/lint/build/vulnerability check workflow, and on tag image test/build/release pipelines, with ko gene…☆103Apr 23, 2024Updated last year
- Automated vulnerability discovery and annotation☆68Jul 26, 2024Updated last year
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆79Sep 1, 2025Updated 5 months ago
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Nov 13, 2025Updated 3 months ago
- Open source vulnerability DB and triage service.☆2,496Feb 20, 2026Updated last week
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 7 months ago
- io_uring based rootkit☆249Apr 24, 2025Updated 10 months ago
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated 11 months ago
- A tool to audit Erlang & Elixir dependencies, to make sure your ✨ gleam projects really sparkle!☆23Jan 5, 2026Updated last month
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Mar 10, 2025Updated 11 months ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆62Jan 25, 2025Updated last year
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential…☆106Dec 2, 2024Updated last year
- Search engine for CTF writeups with instant results.☆152Mar 6, 2025Updated 11 months ago
- 💅🏽 analyzes your github actions☆98Feb 9, 2026Updated 2 weeks ago
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆173Jan 9, 2026Updated last month
- A flexible threat detection platform that simplifies rule management and deployment using K8s CronJob and Helm, but can also run standalo…☆384Oct 1, 2024Updated last year
- Zero shot vulnerability discovery using LLMs☆2,506Feb 6, 2025Updated last year
- A cybersecurity tool designed to safeguard against IDN Homograph Attacks☆45Aug 5, 2025Updated 6 months ago
- A CLI tool (and library) written in Go to simplify the process of retrieving IP addresses from infrastructure hosted on Google Cloud Plat…☆11Nov 20, 2025Updated 3 months ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- ☆72Oct 24, 2025Updated 4 months ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆98Updated this week
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆96Apr 2, 2025Updated 10 months ago
- Validate the isolation posture of your container environment.☆312Feb 11, 2026Updated 2 weeks ago
- Security tool against dependency typosquatting attacks☆54Updated this week
- Secure Code Review AI Agent (SeCoRA) - AI SAST☆54Jan 29, 2025Updated last year
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆16Aug 29, 2025Updated 6 months ago