redpointsec / vtm
Vulnerable Task Manager
☆15Updated 2 months ago
Alternatives and similar repositories for vtm:
Users that are interested in vtm are comparing it to the libraries listed below
- AWS Security Checks☆37Updated 7 years ago
- ☆58Updated last year
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Updated 4 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Updated 4 years ago
- Maturity Model Collaborative project☆14Updated 2 years ago
- ☆28Updated 8 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆77Updated 4 years ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated last year
- recon-ng modules for Censys☆37Updated last year
- multiple password 'asher using Python’s hashlib☆14Updated 4 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- Do bulk whois lookups and get alerted on domains of interest.☆34Updated 7 months ago
- ☆28Updated 5 years ago
- ☆34Updated 4 years ago
- A very vulnerable implementation of a GraphQL API.☆59Updated 3 years ago
- ☆14Updated 2 years ago
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆84Updated 2 years ago
- ☆23Updated 3 years ago
- A static website template for security pages.☆50Updated 7 months ago
- A simple script that generates an Excel friendly CSV file from an Amass JSON file.☆13Updated 2 years ago
- Collection of Slides From My Conference Talks☆20Updated 2 years ago
- Use normal web pentest tools to hack Websockets☆18Updated 5 years ago
- ☆10Updated 6 years ago
- Unofficial api for cve.mitre.org☆41Updated 3 years ago
- An information gathering tool to collect git emails in version control host services☆11Updated 5 years ago