Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)
☆32Apr 21, 2023Updated 2 years ago
Alternatives and similar repositories for VulManAgg
Users that are interested in VulManAgg are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Snyk Node Runtime Agent☆16Apr 12, 2022Updated 3 years ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆36Feb 28, 2025Updated last year
- virustotal API-based project for checking the list of hashes against virustotal.com database☆11Feb 26, 2018Updated 8 years ago
- Beagle(bone) in the Middle☆25Oct 9, 2020Updated 5 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- Windows Security Logging☆43Jul 17, 2022Updated 3 years ago
- A homebrewed cyber threat intelligence solution☆20Nov 20, 2012Updated 13 years ago
- Offsec PWB Lab Tools☆13Nov 14, 2013Updated 12 years ago
- A very fast network scanner of SSL server configurations☆11Mar 28, 2016Updated 9 years ago
- OWASP Foundation web repository☆17Oct 11, 2025Updated 5 months ago
- This CDK stack generates a custom raspbian image which uses AWS IoT Fleet Provisioning to automate onboarding of Raspberry Pi devices to …☆16Jun 22, 2022Updated 3 years ago
- ☆16May 13, 2021Updated 4 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Burp Suite Pro extension☆11May 26, 2017Updated 8 years ago
- ☆13Dec 8, 2022Updated 3 years ago
- toolings for pentester to makes their life easier☆11Feb 25, 2023Updated 3 years ago
- City-spanning BLE delay tolerant network. Very rough proof of concept. Note: this is very old and broken by android api changes. New repo…☆11Mar 29, 2021Updated 4 years ago
- ☆13Aug 10, 2022Updated 3 years ago
- Socks proxy server using powershell. Supports local and reverse connections for pivoting.☆11Oct 7, 2020Updated 5 years ago
- ☆18Dec 6, 2022Updated 3 years ago
- Prototypes for MineMeld nodes☆38Oct 15, 2021Updated 4 years ago
- A quick reference guide for python script development in DFIR☆17Mar 20, 2024Updated 2 years ago
- Two applications for the M5Stack ATOM Echo running MicroPython.☆14Jun 2, 2020Updated 5 years ago
- ☆16Mar 7, 2026Updated 2 weeks ago
- Cyber competition scoring engine☆17Jun 15, 2016Updated 9 years ago
- Create machine images containing the Guacamole remote desktop gateway☆11Mar 16, 2026Updated last week
- 🗳A voting app that keeps votes in a blockchain. Build using Next.js ▲, Firebase 🔥Tailwind.css 💨and WebRTC 🗣☆13Dec 9, 2022Updated 3 years ago
- ☆20Jul 16, 2025Updated 8 months ago
- A repository to share contributions related to TheHive Project☆22Sep 15, 2021Updated 4 years ago
- Endpoint monitoring stack.☆19Nov 5, 2015Updated 10 years ago
- A compendium of threat modeling and security testing resources for LLMs and GenAI agents☆18Oct 16, 2024Updated last year
- Listo. Use questionnaires and checklists to make it easy to do the right thing, regarding the software you build.☆28Apr 7, 2023Updated 2 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆12Feb 16, 2021Updated 5 years ago
- A project to visualize the software supply chain☆58Sep 9, 2023Updated 2 years ago
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆23May 4, 2024Updated last year
- verinice.veo is a cloud-native application for managing information security and data protection☆22Mar 17, 2026Updated last week
- Event Query Router☆12Aug 9, 2019Updated 6 years ago
- ☆15Nov 15, 2023Updated 2 years ago