Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)
☆32Apr 21, 2023Updated 2 years ago
Alternatives and similar repositories for VulManAgg
Users that are interested in VulManAgg are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scripts to automate Veracode security scans☆16Aug 13, 2013Updated 12 years ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆36Feb 28, 2025Updated last year
- ☆11Dec 5, 2023Updated 2 years ago
- Architecture - design and implementation of the D4 project architecture☆16Jul 3, 2025Updated 9 months ago
- Queries for Carbon Black Response☆11Feb 11, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Beagle(bone) in the Middle☆25Oct 9, 2020Updated 5 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- Windows Security Logging☆43Jul 17, 2022Updated 3 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆19Jun 9, 2013Updated 12 years ago
- Offsec PWB Lab Tools☆13Nov 14, 2013Updated 12 years ago
- OWASP Foundation web repository☆17Oct 11, 2025Updated 6 months ago
- ☆16May 13, 2021Updated 4 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- ☆19Jan 2, 2021Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A Productivity-Boosting Burp Suite extension written in Kotlin that enables persistent sticky session handling in web application testing…☆13Oct 8, 2025Updated 6 months ago
- A transformer that decodes swipes across a smartphone keyboard into words (gesture / swipe / glide typing) (enhanced yandex cup solution)☆15Feb 20, 2026Updated last month
- Automatically perform advanced NTLM hash relay attacks☆15Nov 4, 2022Updated 3 years ago
- ☆14Aug 10, 2022Updated 3 years ago
- Socks proxy server using powershell. Supports local and reverse connections for pivoting.☆11Oct 7, 2020Updated 5 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Jan 6, 2021Updated 5 years ago
- ☆11May 16, 2024Updated last year
- Prototypes for MineMeld nodes☆38Oct 15, 2021Updated 4 years ago
- A common base template for Django web apps using Bootstrap☆19Aug 3, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆16Mar 29, 2026Updated 2 weeks ago
- Standardizing Security Titles☆23Updated this week
- a place to have conversations about OpenControl projects☆17Apr 30, 2019Updated 6 years ago
- Ruggedy Vulnerability Management App☆14Dec 8, 2019Updated 6 years ago
- 🗳A voting app that keeps votes in a blockchain. Build using Next.js ▲, Firebase 🔥Tailwind.css 💨and WebRTC 🗣☆13Dec 9, 2022Updated 3 years ago
- IoT Scanner by ASA - Scan for active IoT devices and find their vulnerabilities☆11Apr 28, 2022Updated 3 years ago
- CVE feed synchronization to issue management system☆58Dec 28, 2014Updated 11 years ago
- Endpoint monitoring stack.☆19Nov 5, 2015Updated 10 years ago
- A repository to share contributions related to TheHive Project☆22Sep 15, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A compendium of threat modeling and security testing resources for LLMs and GenAI agents☆18Oct 16, 2024Updated last year
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆12Feb 16, 2021Updated 5 years ago
- verinice.veo is a cloud-native application for managing information security and data protection☆23Updated this week
- XSS Payloads☆20Sep 21, 2017Updated 8 years ago
- Spring-Boot app for demonstrating security vulnaribilities☆13Aug 21, 2019Updated 6 years ago
- ☆19Mar 6, 2012Updated 14 years ago
- Presentations☆10Oct 2, 2017Updated 8 years ago