schokokeksorg / freewvs
A local scanner for vulnerable web applications
☆38Updated last week
Alternatives and similar repositories for freewvs:
Users that are interested in freewvs are comparing it to the libraries listed below
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Updated 4 years ago
- Decryption utility for PGP Whole Disk Encryption☆18Updated 3 years ago
- D4 core software (server and sample sensor client)☆43Updated last year
- An open source software directory and release tracker.☆23Updated this week
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆25Updated last year
- Web of trust grapher☆39Updated 9 months ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- Modular IMAP proxy (including PyCIRCLeanMail and MISP forward modules)☆28Updated 6 years ago
- 🚒 Don't let threats reach your machines — USB Mass Storage Gateway☆17Updated 5 years ago
- ☆25Updated 3 years ago
- Extract TLS metadata from connection in JSON format.☆16Updated 4 years ago
- A generic log anonymizer☆20Updated 3 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 5 years ago
- ☆27Updated 7 years ago
- OpenSSHd Security Config Checker☆24Updated last year
- Command line utility for parsing certificates☆61Updated 3 years ago
- Email Analysis Toolkit☆25Updated 3 years ago
- Hardened debian linux baseimage for Docker.☆40Updated last year
- A privacy-aware exchange module to securely and privately share your indicators☆13Updated 7 years ago
- X.509 Swiss Army Knife is a toolkit atop OpenSSL to ease generation of CAs and aid white-hat pentesting☆40Updated last year
- CERTITUDE - A python package to classify malicious URLs☆20Updated 2 years ago
- The official LibPrelude GitHub mirror of https://www.prelude-siem.org/projects/libprelude/repository☆12Updated 4 years ago
- Architecture - design and implementation of the D4 project architecture☆16Updated 3 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 2 years ago
- Certificate Revocation List monitor☆40Updated 5 months ago
- nmap/ndiff based scanner with template based notification system in case of infrastructure changes☆18Updated 6 years ago
- experimental threat modeling tools☆14Updated 2 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Updated 6 years ago