Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data
☆66Mar 2, 2026Updated this week
Alternatives and similar repositories for CVElk
Users that are interested in CVElk are comparing it to the libraries listed below
Sorting:
- CISA Known Exploited Vulnerabilities Catalog Enrichment☆19Jun 24, 2024Updated last year
- Automation of some MAPT activities and interaction with the mobile Android device.☆22Sep 28, 2025Updated 5 months ago
- Collection of templates from various resources☆43Dec 5, 2025Updated 2 months ago
- An implementation of a Model Context Protocol (MCP) for the Nuclei scanner. This tool enables context-aware vulnerability scanning by int…☆39Aug 4, 2025Updated 7 months ago
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- Automation with SSH for Hacking☆10Jan 28, 2025Updated last year
- ☆14Nov 8, 2024Updated last year
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆29Jul 4, 2023Updated 2 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 5 years ago
- Methodoloy for pentesting web applications.☆10Aug 18, 2022Updated 3 years ago
- Automated tool for domains & Subdomains Gathering☆14Updated this week
- Spring4Shell reproduce☆11Apr 1, 2022Updated 3 years ago
- ☆14Nov 21, 2022Updated 3 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆13Nov 1, 2024Updated last year
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆36May 14, 2022Updated 3 years ago
- Database interaction layer to store the Open Asset Model in a database management system☆21Updated this week
- Burp Extension for copying requests safely. It redacts headers like Cookie, Authorization and X-CSRF-Token for now. More support can be a…☆18May 17, 2020Updated 5 years ago
- Obfuscated Invoke-Mimikatz script☆13May 29, 2018Updated 7 years ago
- Repo for hosting rayder workflows☆63Aug 31, 2023Updated 2 years ago
- All xxx-arsenal repos in one☆17Jan 28, 2019Updated 7 years ago
- Find subdomains by searching public certificate records☆16Jun 11, 2024Updated last year
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Jun 15, 2021Updated 4 years ago
- the puppy proxy☆22May 19, 2020Updated 5 years ago
- Malware campaigns and APTs research by BlackArrow☆19Apr 30, 2020Updated 5 years ago
- Some Templates for Bash Scripting☆17Sep 30, 2022Updated 3 years ago
- A GitHub Action for running ZAP Automation Framework plans☆23Sep 30, 2025Updated 5 months ago
- Network scan tool for host and service discovery. Written in Rust.☆21Feb 17, 2026Updated 2 weeks ago
- Zzl is a reconnaissance tool that collects subdomains from SSL certificates in IP ranges☆44Oct 27, 2024Updated last year
- Monthly CVE Stats☆44Updated this week
- Materials used in preperation for the BSCP certification from PortSwigger☆18Jan 28, 2022Updated 4 years ago
- OpenAEV Docker deployment helpers☆28Updated this week
- LLMON 🍋 - The World's First Web Adversarial AI Firewall☆40Jan 3, 2026Updated 2 months ago
- OWASP Foundation Web Respository☆23Oct 4, 2025Updated 5 months ago
- A curated list of tools for incident response☆21Sep 24, 2019Updated 6 years ago
- Living Off Security Tools☆58Nov 23, 2025Updated 3 months ago
- A Burp Suite extension which augments your proxy traffic by injecting log4shell payloads into headers☆42Dec 13, 2021Updated 4 years ago
- Finds Documents On Cloud Assets Using grayhatwarfare API for short urls☆23Mar 2, 2022Updated 4 years ago
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago