Faraday Continuous Scanning
☆34Sep 29, 2016Updated 9 years ago
Alternatives and similar repositories for cscan
Users that are interested in cscan are comparing it to the libraries listed below
Sorting:
- Cross Distribution Exploit Testing☆28Sep 23, 2015Updated 10 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- Wardriving ekoparty☆15Oct 9, 2017Updated 8 years ago
- simple python script that import Tenable Nessus scan result into Atlassian Jira task☆20Oct 2, 2018Updated 7 years ago
- CVE-2016-2776☆27Oct 3, 2016Updated 9 years ago
- Nessus Vulnerability Scanner in a Docker container☆10Sep 25, 2018Updated 7 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- IRMA ansible☆24Nov 28, 2016Updated 9 years ago
- Faraday Agent Dispatcher launches any security tools and send results to Faradaysec Platform.☆48Mar 13, 2026Updated last week
- Basic gui to run and display nmap scan results. Just a POC so far.☆30Oct 27, 2013Updated 12 years ago
- A Java JAXB library for generating events conforming to the Event Logging XML Schema☆16Aug 5, 2024Updated last year
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago
- ☆12Oct 29, 2015Updated 10 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- Python scripts to exploit CVE-2014-9016 and CVE-2014-9034☆13Dec 27, 2014Updated 11 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆14Nov 29, 2023Updated 2 years ago
- Technical reports and preprints☆14Jul 30, 2016Updated 9 years ago
- Nessus Vulnerability visualization for the web☆31Jan 25, 2016Updated 10 years ago
- Local Transform Wrapper for Maltego☆11May 24, 2016Updated 9 years ago
- DOS Program Development☆13Nov 9, 2022Updated 3 years ago
- eSentire additions to the nmap network scanner☆14Mar 29, 2016Updated 9 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 12 years ago
- deprecated☆27Mar 20, 2019Updated 7 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Apr 21, 2017Updated 8 years ago
- A Hipchat plugin for Sentry☆35Nov 3, 2015Updated 10 years ago
- A GPL fork of the popular wordpress vulnerability scanner WPScan☆214Aug 23, 2019Updated 6 years ago
- ☆15Apr 9, 2018Updated 7 years ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- ☆20May 12, 2016Updated 9 years ago
- D-RAT SRC Extract☆13Dec 24, 2016Updated 9 years ago
- ☆20Dec 29, 2015Updated 10 years ago
- Pentest utils☆14Oct 8, 2016Updated 9 years ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- Django Web UI contributed by Yandex for w3af.☆51Mar 17, 2015Updated 11 years ago
- Useful stuff for talking to a luna HSMs with pyeleven☆12Jul 10, 2025Updated 8 months ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 8 years ago
- Vulnerability Management tool using the CVE-Search database☆10Apr 22, 2016Updated 9 years ago
- Telegram Bot that performs checks of the yararules.com ruleset☆13May 13, 2016Updated 9 years ago