midnightslacker / cveWatcher
Query the National Vulnerability Database (NVD) for CVE's relating to a vendor and/or product
☆9Updated 6 years ago
Related projects: ⓘ
- A firewall penetration testing tool suite.☆11Updated 7 years ago
- Using osquery for Mass Incident Detection & Response☆18Updated 8 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆31Updated 6 months ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 3 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 8 years ago
- first commit☆20Updated 10 months ago
- API to access the Redis database of a BGP Ranking instance.☆17Updated 6 years ago
- ☆42Updated this week
- Websocket based egress tester☆20Updated 7 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 9 years ago
- Popping boxes with Nmap☆17Updated 12 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆17Updated 10 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- Homographs: brutefind homographs within a font☆18Updated 7 years ago
- This repository is a curated list of pro bono incident response entities.☆19Updated last year
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 9 years ago
- ☆27Updated this week
- Bash scripts to help setup port redirects with iptables☆16Updated 7 years ago
- a mass web screenshot tool for mapping web networks.☆24Updated 9 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 6 years ago
- A curated list of tools for incident response☆27Updated 6 months ago
- Advanced HTTP fingerprinting PoC☆44Updated 7 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- Linux and Windows Hardening Points☆12Updated 6 years ago
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 9 years ago
- Looks for GitHub org users without 2FA turned on☆9Updated 8 years ago
- ☆14Updated this week
- Collection of information security policies.☆27Updated 7 years ago
- Find useful stuff in pastebin☆23Updated 11 years ago
- Why hunt when you can seine?☆21Updated 9 years ago