ra1nb0rn / search_vulns
Search for known vulnerabilities in software using software titles or a CPE 2.3 string
☆31Updated 3 weeks ago
Alternatives and similar repositories for search_vulns:
Users that are interested in search_vulns are comparing it to the libraries listed below
- ☆27Updated last year
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆86Updated last year
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆25Updated 5 months ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆123Updated 10 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆35Updated 9 months ago
- ☆36Updated last month
- A National Vulnerability Database (NVD) API query tool☆18Updated last year
- aws cli pentesting/red team snippets☆32Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- AssetViz simplifies the visualization of subdomains from input files, presenting them as a coherent mind map. Ideal for penetration test…☆32Updated 10 months ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆39Updated last year
- Tools used for Pentesting☆22Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆28Updated last month
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆22Updated 10 months ago
- Unicode Security Toolkit☆33Updated 4 months ago
- Enumerate AWS permissions and resources.☆67Updated 2 years ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆63Updated last year
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆62Updated 5 months ago
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆49Updated last year
- Azure Service Subdomain Enumeration☆52Updated 5 months ago
- C2 Automation using Linode☆80Updated 2 years ago
- ☆55Updated 2 months ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆26Updated 7 months ago
- ☆53Updated last year
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆26Updated last year