Extensible framework for analyzing publicly available information about vulnerabilities
☆130Mar 14, 2026Updated last month
Alternatives and similar repositories for vulristics
Users that are interested in vulristics are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked …☆36Aug 19, 2024Updated last year
- A tool which tries to map CVEs from NVD to packages in supported ecosystems (Maven, NPM, PyPI).☆12Jul 12, 2025Updated 9 months ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆17Oct 30, 2021Updated 4 years ago
- 🐊 A small Password Attack☆15Apr 1, 2024Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆42Dec 2, 2020Updated 5 years ago
- The program allows to download large data from shodan quickly, simply and avoid errors.☆29Nov 3, 2020Updated 5 years ago
- The difference between exploitation prediction and detection is akin to the difference between detecting a missile launch or a detonation…☆13Apr 25, 2026Updated last week
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- A collection of one off hacks and simple scripts☆26Mar 21, 2023Updated 3 years ago
- A repository with data about APTs☆13Nov 24, 2022Updated 3 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 4 years ago
- Flexible Penetrate Testing Auxiliary Suite☆73Jun 19, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Python implementation of Stakeholder-Specific Vulnerability Categorization (SSVC)☆22Apr 17, 2026Updated 2 weeks ago
- Efficient clustering of MASSCAN results☆12Dec 26, 2016Updated 9 years ago
- Modern real world bug bounty payloads and exploitation techniques with may earn you some $$$.☆30Nov 7, 2023Updated 2 years ago
- Web-based check for Windows privesc vulnerabilities☆139May 14, 2023Updated 2 years ago
- Hacking, pen-testing, and cyber-security related tools built with Python.☆36Nov 20, 2020Updated 5 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Nov 19, 2021Updated 4 years ago
- Virtual Security Operations Center☆52Aug 28, 2023Updated 2 years ago
- Modern Honey Network deployment with ansible☆12Jun 4, 2022Updated 3 years ago
- Misc stuff from internet☆12Apr 13, 2026Updated 2 weeks ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A tool to parse, deduplicate, and query multiple port scans.☆57Aug 11, 2023Updated 2 years ago
- Reconflow is all in one tool for gathering reconnaissance information about a target in a penetration test☆14Jul 18, 2021Updated 4 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Jan 12, 2026Updated 3 months ago
- This is the official repository for the back end of Mobilinux App.☆21Oct 1, 2023Updated 2 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Apr 20, 2021Updated 5 years ago
- ATLAS - Malware Analysis Description☆21Jun 9, 2023Updated 2 years ago
- Vulnerability Information Aggregator for CVEs☆124Jun 13, 2019Updated 6 years ago
- A free data collection and YARA scanning tool for cybersecurity incident investigation, compromise assessment and threat hunting☆22Nov 12, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Python framework to automatically discover and enumerate hosts from different back-end systems (Shodan, Censys)☆298Jul 21, 2021Updated 4 years ago
- Security tools to use on assessments.☆41May 9, 2016Updated 9 years ago
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 7 years ago
- WebAMS is an Open Source web application for reporting and resolving incidents or tickets☆10Dec 11, 2022Updated 3 years ago
- Open source tool for static analysis of malwares.☆30Jul 10, 2020Updated 5 years ago
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆23Dec 13, 2018Updated 7 years ago
- Tentacle is a POC vulnerability verification and exploit framework. It supports free extension of exploits and uses POC scripts. It suppo…☆374Mar 6, 2024Updated 2 years ago