Linux Exploit Mapper correlates CVEs local to a Linux system with known exploits
☆45May 9, 2022Updated 3 years ago
Alternatives and similar repositories for lem
Users that are interested in lem are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ansible role for security standards compliance☆13Mar 6, 2019Updated 7 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- Ansible role that configures a host to be a target in a cyber range☆15Mar 17, 2019Updated 7 years ago
- Containerized pentesting tools☆46May 9, 2022Updated 3 years ago
- Quantitate binary risk assessment☆17May 9, 2022Updated 3 years ago
- The cogito language implementation☆11Apr 11, 2020Updated 5 years ago
- Security Control Knowledge Graph☆43Jul 6, 2022Updated 3 years ago
- This is a set of scripts that scan a Linux system looking for security and robustness problems.☆17Nov 3, 2024Updated last year
- OSCAL SSP content for technologies shipped by Red Hat☆16Mar 2, 2023Updated 3 years ago
- A collection of OSCE preparation resources.☆24Oct 30, 2019Updated 6 years ago
- Raptor - Web application firewall [ Stable ]☆15Dec 8, 2016Updated 9 years ago
- pentestscripts☆16Sep 16, 2019Updated 6 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Oct 28, 2020Updated 5 years ago
- ZigBee hacking tools and scripts☆14Mar 25, 2018Updated 8 years ago
- Plugin to integrate Docker Machine☆12May 27, 2018Updated 7 years ago
- Splunk app for Threat hunting☆15Nov 15, 2018Updated 7 years ago
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- Tests AD passwords while respecting Bad Password Count☆18Mar 27, 2019Updated 6 years ago
- Scripts to control an "OSCP-like" lab environment.☆23Aug 14, 2017Updated 8 years ago
- API for nCrypt.site☆10Jun 25, 2022Updated 3 years ago
- Execute codes From XSLT☆16Dec 28, 2016Updated 9 years ago
- web based nmap scan collection and search☆19May 13, 2021Updated 4 years ago
- Data Exfiltration via HTTP Traffic (C# and Shell Script)☆17Jun 5, 2023Updated 2 years ago
- A Python module for Palo Alto Networks' WildFire API☆11Feb 18, 2020Updated 6 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Nov 29, 2019Updated 6 years ago
- A multi-threaded Golang scanner to identify Ruby endpoints vulnerable to CVE-2019-5418☆35Mar 21, 2019Updated 7 years ago
- The DearBytes remote integrity tool is an IDS (Intrusion Detection System) that keeps track of files on a remote server and logs an event…☆12Apr 18, 2019Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Aug 3, 2018Updated 7 years ago
- Python script to detect bluekeep vulnerability (CVE-2019-0708) with TLS/SSL and x509 support☆27Jun 12, 2019Updated 6 years ago
- ☆22Feb 4, 2017Updated 9 years ago
- A bunch of scripts used for network defense during competitions.☆15Apr 3, 2015Updated 10 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Mar 16, 2026Updated last week
- ☆11Mar 14, 2021Updated 5 years ago
- Template repo for Conjur repositories☆17Nov 3, 2025Updated 4 months ago
- A very vulnerable implementation of a GraphQL API.☆17Mar 13, 2026Updated last week
- Just a bunch of useful links to take (and pass!) OSCP☆19May 18, 2020Updated 5 years ago
- ☆53Mar 4, 2019Updated 7 years ago
- This script will generate hashes (MD5, SHA1, SHA256), submit the MD5 to Virus Total, and produce a text file with the results.☆15Jul 13, 2023Updated 2 years ago
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago