ozelfatih / Vulmap-Linux
Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilities with available exploits. All found exploits can be downloaded by Vulmap.
☆15Updated 5 years ago
Alternatives and similar repositories for Vulmap-Linux:
Users that are interested in Vulmap-Linux are comparing it to the libraries listed below
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆45Updated 4 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Creating a vulnerable environment and the PoC☆15Updated 5 years ago
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- Listing subdomains about a main domain☆58Updated 6 years ago
- BlackHat Europe 2017 Slides☆26Updated 7 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- Hacking Wordlist collections for password cracking are attached in the below files☆16Updated 7 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- ☆47Updated 9 years ago
- ☆25Updated 3 years ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 7 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- ArmourBird CSF - Container Security Framework☆44Updated 2 years ago
- Extension adds a new tab in Burp Suite called Extractor☆42Updated 6 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- Scan for open S3 buckets and dump☆36Updated 7 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- The goal of this program is to quickly pull and install repos from its list☆40Updated 2 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆49Updated 6 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- Web application that lets you test if your domain is vulnerable to email spoofing☆35Updated 6 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- CVE-2017-8570 Exploit☆21Updated 7 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Updated 12 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago