Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilities with available exploits. All found exploits can be downloaded by Vulmap.
☆16Apr 20, 2019Updated 6 years ago
Alternatives and similar repositories for Vulmap-Linux
Users that are interested in Vulmap-Linux are comparing it to the libraries listed below
Sorting:
- sAoccec something about ossec☆17Apr 27, 2013Updated 12 years ago
- Assembled Labeled Library for Static Analysis Research - Debian packages built for 6 architectures, storing compiler artifacts, binaries…☆28Apr 23, 2021Updated 4 years ago
- A tool which tries to map CVEs from NVD to packages in supported ecosystems (Maven, NPM, PyPI).☆12Jul 12, 2025Updated 8 months ago
- Compiler Fingerprinting☆14Apr 24, 2015Updated 10 years ago
- IntFlow is an LLVM-based arithmetic error detection tool that combines static information flow tracking and dynamic program analysis☆16Apr 4, 2015Updated 10 years ago
- Convert a raw firmware image to an ELF file.☆14Feb 6, 2019Updated 7 years ago
- ☆21Mar 10, 2026Updated last week
- Python scripts to scan IoT devices for vulnerabilities.☆22May 21, 2018Updated 7 years ago
- ☆11Nov 12, 2019Updated 6 years ago
- encrypted-linux-kernel-modules☆12Nov 4, 2020Updated 5 years ago
- SuperNES - Super Nmap Easy Scanner☆10Oct 2, 2018Updated 7 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 4 years ago
- Creating a vulnerable environment and the PoC☆15Nov 25, 2019Updated 6 years ago
- Robson is a simple LKM rootkit that uses the Linux kernel's kprobes tracing feature as a hooking mechanism.☆13Feb 16, 2023Updated 3 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Jun 30, 2018Updated 7 years ago
- Simple Spyder BOT Auto Exploit Mass Local File Disclosure Joomla ( Fix Speed ) <3☆10Nov 5, 2019Updated 6 years ago
- Symbolic Execution of Android Framework☆15Jun 25, 2017Updated 8 years ago
- Semantic Crash Bucketing☆16Sep 8, 2020Updated 5 years ago
- 🍭 Web Application Vulnerability Scanner 🍭☆17May 21, 2022Updated 3 years ago
- Build a 2TB Unified Memory AI Supercomputer with Mac Studios - Companion guide to NetworkChuck's YouTube video☆45Dec 20, 2025Updated 3 months ago
- Web Information Gathering☆18Feb 23, 2015Updated 11 years ago
- Crowdsourced fuzzing cluster. 🚀☆21Sep 15, 2021Updated 4 years ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆22Aug 3, 2020Updated 5 years ago
- KLEE / CSE Project☆48Apr 3, 2020Updated 5 years ago
- Customized version of QEMU 2.4.0 exposing the TCG frontend and the helpers☆18Dec 22, 2025Updated 2 months ago
- ☆18Sep 22, 2018Updated 7 years ago
- his program shows you IMSI numbers, country, brand and operator of cellphones around you. /!\ This program was made to understand how GS…☆13Dec 27, 2018Updated 7 years ago
- S2E plugins library☆17Jan 7, 2020Updated 6 years ago
- User defined static call-tree constraints in C++. This is the implementation of the tool for my masters thesis.☆14Sep 25, 2018Updated 7 years ago
- QEmu backend for avatar²☆22Mar 29, 2025Updated 11 months ago
- PoC of CVE-2019-15126 kr00k vulnerability☆12Mar 19, 2020Updated 6 years ago
- Shock the shell! Exploit many injection method for shellshock☆18Sep 3, 2018Updated 7 years ago
- An tool for search IOT MQTT vulnerable with shodan☆20Sep 15, 2017Updated 8 years ago
- SootDiff - Bytecode Comparison Across Different Java Compilers☆18May 24, 2024Updated last year
- Speculative Store Bypass (CVE-2018-3639) proof of concept for Linux☆15Oct 22, 2021Updated 4 years ago
- Listing subdomains about a main domain☆59May 9, 2018Updated 7 years ago
- Is the buffer's indentation consistent and does it conform to tab settings?☆13Nov 10, 2024Updated last year
- Code for Book "AI for Cybersecurity: A Handbook of Use Case"☆22Aug 10, 2023Updated 2 years ago
- JitterBug passively searches for Basic Info, open ports, potential CVE's on the given Target IP in third party databases without Direct i…☆13Sep 29, 2021Updated 4 years ago