Linux Exploit Mapper correlates CVEs local to a Linux system with known exploits
☆45May 9, 2022Updated 3 years ago
Alternatives and similar repositories for lem
Users that are interested in lem are comparing it to the libraries listed below
Sorting:
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- Ansible role for security standards compliance☆13Mar 6, 2019Updated 6 years ago
- Containerized pentesting tools☆46May 9, 2022Updated 3 years ago
- Quantitate binary risk assessment☆17May 9, 2022Updated 3 years ago
- Ansible role that configures a host to be a target in a cyber range☆15Mar 17, 2019Updated 6 years ago
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- Security Control Knowledge Graph☆42Jul 6, 2022Updated 3 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Feb 24, 2026Updated last week
- Raptor - Web application firewall [ Stable ]☆15Dec 8, 2016Updated 9 years ago
- Dependency vulnerability auditor for Ruby☆13Jan 22, 2026Updated last month
- pentestscripts☆16Sep 16, 2019Updated 6 years ago
- A very vulnerable implementation of a GraphQL API.☆17Feb 12, 2026Updated 2 weeks ago
- Python wrapper for the Mitre ATT&CK framework API☆31Mar 12, 2018Updated 7 years ago
- ZigBee hacking tools and scripts☆14Mar 25, 2018Updated 7 years ago
- Template repo for Conjur repositories☆17Nov 3, 2025Updated 4 months ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆16Jul 16, 2025Updated 7 months ago
- The DearBytes remote integrity tool is an IDS (Intrusion Detection System) that keeps track of files on a remote server and logs an event…☆12Apr 18, 2019Updated 6 years ago
- web based nmap scan collection and search☆19May 13, 2021Updated 4 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Nov 29, 2019Updated 6 years ago
- Data Exfiltration via HTTP Traffic (C# and Shell Script)☆17Jun 5, 2023Updated 2 years ago
- Execute codes From XSLT☆16Dec 28, 2016Updated 9 years ago
- Tests AD passwords while respecting Bad Password Count☆18Mar 27, 2019Updated 6 years ago
- This is a set of scripts that scan a Linux system looking for security and robustness problems.☆17Nov 3, 2024Updated last year
- Network and web related exploratory playground.☆19Apr 6, 2016Updated 9 years ago
- ☆17Jan 3, 2021Updated 5 years ago
- A bunch of scripts used for network defense during competitions.☆15Apr 3, 2015Updated 10 years ago
- ☆18Mar 15, 2018Updated 7 years ago
- Simple, useful scripts for red/blue team situations☆22May 4, 2015Updated 10 years ago
- 微信支付宝个人收款码管理平台☆10Jun 17, 2020Updated 5 years ago
- Scripts to control an "OSCP-like" lab environment.☆23Aug 14, 2017Updated 8 years ago
- Just a bunch of useful links to take (and pass!) OSCP☆19May 18, 2020Updated 5 years ago
- scanver☆21Nov 13, 2018Updated 7 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Mar 21, 2023Updated 2 years ago
- w3af packaging for Kali distribution☆26Nov 29, 2015Updated 10 years ago
- Reference sheet for Threat Hunting Professional Course☆26Mar 10, 2019Updated 6 years ago
- Python script to detect bluekeep vulnerability (CVE-2019-0708) with TLS/SSL and x509 support☆27Jun 12, 2019Updated 6 years ago
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago
- An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk☆23Jul 10, 2018Updated 7 years ago
- ☆21May 1, 2019Updated 6 years ago