leonov-av / vulristicsView external linksLinks
Extensible framework for analyzing publicly available information about vulnerabilities
☆128Feb 4, 2026Updated last week
Alternatives and similar repositories for vulristics
Users that are interested in vulristics are comparing it to the libraries listed below
Sorting:
- A tool which tries to map CVEs from NVD to packages in supported ecosystems (Maven, NPM, PyPI).☆12Jul 12, 2025Updated 7 months ago
- Zoho ManageEngine Desktop Central CVEs☆15Oct 5, 2020Updated 5 years ago
- The program allows to download large data from shodan quickly, simply and avoid errors.☆29Nov 3, 2020Updated 5 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- 🐊 A small Password Attack☆15Apr 1, 2024Updated last year
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆42Dec 2, 2020Updated 5 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆17Oct 30, 2021Updated 4 years ago
- tools for CI fuzzing automation☆34Sep 1, 2025Updated 5 months ago
- Набор скриптов для парсинга агрегаторов уязвимостей и выгрузки информации в YouTrack☆30Jan 30, 2024Updated 2 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Nov 19, 2021Updated 4 years ago
- ☆15Sep 4, 2024Updated last year
- ☆26Jan 7, 2024Updated 2 years ago
- only for 31337☆24Nov 19, 2016Updated 9 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 7 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Jan 12, 2026Updated last month
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- A repo for output of an intrusion prediction project☆11Feb 8, 2026Updated last week
- Modern Honey Network deployment with ansible☆12Jun 4, 2022Updated 3 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 3 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- This is the official repository for the back end of Mobilinux App.☆21Oct 1, 2023Updated 2 years ago
- Quick and dirty System (Power)Shell using NamedPipe impersonation.☆43Oct 28, 2016Updated 9 years ago
- Flexible Penetrate Testing Auxiliary Suite☆73Jun 19, 2023Updated 2 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Dec 20, 2020Updated 5 years ago
- A small pentesting lab for Azure☆11Apr 19, 2019Updated 6 years ago
- ☆10Mar 5, 2018Updated 7 years ago
- Compiler Fingerprinting☆14Apr 24, 2015Updated 10 years ago
- ☆12Dec 3, 2022Updated 3 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- ☆10Jul 9, 2020Updated 5 years ago
- Misc stuff from internet☆12Nov 5, 2025Updated 3 months ago
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Jan 9, 2020Updated 6 years ago
- A repository with data about APTs☆13Nov 24, 2022Updated 3 years ago
- ATLAS - Malware Analysis Description☆21Jun 9, 2023Updated 2 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 11 years ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- ☆12Apr 6, 2024Updated last year