optiv / nvdsearchLinks
A National Vulnerability Database (NVD) API query tool
☆17Updated 2 years ago
Alternatives and similar repositories for nvdsearch
Users that are interested in nvdsearch are comparing it to the libraries listed below
Sorting:
- ☆27Updated 2 years ago
- A steampipe plugin to query projectdiscovery.io tools.☆27Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).☆56Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Updated last year
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆43Updated 7 months ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆34Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- Red Teaming & Active Directory Cheat Sheet.☆41Updated 2 years ago
- Discord C2 Profile for Mythic☆33Updated 11 months ago
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆44Updated 3 years ago
- Manage attack surface data on Elasticsearch☆23Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 3 years ago
- CVE-2013-4786 Go exploitation tool☆39Updated 2 months ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Updated 7 months ago
- ☆53Updated 2 years ago
- FireProx written in Go☆21Updated last year
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆39Updated 2 years ago
- .NET wrapper around LogonUserA to test creds☆12Updated 3 years ago
- Exploits Unauth Docker API☆43Updated 9 months ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- Determine the running software version of a remote F5 BIG-IP management interface.☆69Updated 2 years ago
- Dump Kerberos tickets from the KCM database of SSSD☆53Updated 3 weeks ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆60Updated 11 months ago
- Simple Python script to sort nuclei scans by severity and URL☆29Updated 2 years ago
- Convert ldapdomaindump to Bloodhound☆80Updated 2 years ago
- ☆29Updated 2 years ago
- Fast website scraper and wordlist generator☆82Updated 8 months ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- Open-Source Phishing Toolkit☆19Updated 4 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated 2 years ago