s-index / go-cve-search
lightweight CVE search
☆21Updated last year
Alternatives and similar repositories for go-cve-search:
Users that are interested in go-cve-search are comparing it to the libraries listed below
- Keyhack - Golang API token/webhook validator☆16Updated 5 years ago
- Small Helper Library to increase automatically the file descriptors limits for the current process☆23Updated last year
- Tiny library to parse the subdomain, domain, and tld extension from a host string☆23Updated 2 years ago
- A basic golang server/client for distributing tasks over multiple systems.☆37Updated 4 years ago
- Execute tasks across SSH hosts using random selection☆17Updated 4 years ago
- Implements io.ReaderAt over raw memory.☆13Updated 4 years ago
- Some helpful Helm Charts for pentesters☆39Updated 6 years ago
- gozero: the wannabe zero dependency runtime for Go developers (experimental)☆20Updated 3 months ago
- A wrapper around jq, to help you parse jq output!☆30Updated 4 years ago
- Golang port for Metasploit's pattern_create and pattern_offset☆12Updated 3 years ago
- Hybrid memory/disk map☆53Updated this week
- roundrobin with configurable rotating strategies☆15Updated last year
- Proof-of-Concept python script that implements DNS spoofing attack in Kubernetes environment from a pod located on a Worker server☆14Updated 4 years ago
- Go package for resolving IP addresses back to published cloud provider public ranges☆28Updated 6 years ago
- Rosie the Pivoter☆17Updated 6 years ago
- Tiny embeddable dns server☆43Updated this week
- ☆16Updated 4 years ago
- Network Policy Helper☆17Updated this week
- ☆20Updated 6 years ago
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆32Updated 4 years ago
- Swiftly search FDNS datasets from Rapid7 Open Data☆21Updated 2 years ago
- CIDR to IP List Tool☆14Updated 8 years ago
- ☆33Updated 4 years ago
- extracts urls from text☆16Updated 6 years ago
- Import and display Masscan data☆34Updated last month
- Shell utility to list colorfully show what processes are listening on what ports.☆19Updated 5 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Updated last year
- Signatures for wraith used to detect secrets across various sources☆15Updated 2 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆10Updated last year
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆14Updated last year