schokokeksorg / freewvsLinks
A local scanner for vulnerable web applications
☆41Updated this week
Alternatives and similar repositories for freewvs
Users that are interested in freewvs are comparing it to the libraries listed below
Sorting:
- Decryption utility for PGP Whole Disk Encryption☆20Updated 4 years ago
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆26Updated 2 years ago
- An open source software directory and release tracker.☆25Updated last week
- socat version 2☆10Updated 13 years ago
- 🚒 Don't let threats reach your machines — USB Mass Storage Gateway☆17Updated 6 years ago
- Command line utility for parsing certificates☆67Updated 4 years ago
- Web of trust grapher☆39Updated 7 months ago
- Modular IMAP proxy (including PyCIRCLeanMail and MISP forward modules)☆32Updated 7 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 3 years ago
- D4 core software (server and sample sensor client)☆42Updated 2 years ago
- ☆22Updated 7 years ago
- Identify servers running various SSL VPNs based on protocol-specific behaviors☆88Updated last year
- A static website template for security pages.☆54Updated 6 months ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 6 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Updated 5 years ago
- ☆27Updated 7 years ago
- Quijote is an highly configurable HTTP middleware for API security.☆47Updated 5 years ago
- A generic log anonymizer☆21Updated 4 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆49Updated 8 years ago
- X.509 Swiss Army Knife is a toolkit atop OpenSSL to ease generation of CAs and aid white-hat pentesting☆45Updated 2 years ago
- ☆15Updated 6 years ago
- Enterprise Linux Exploit Mapper☆28Updated 8 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 7 years ago
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆37Updated 6 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Updated 7 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11Updated 6 years ago
- Extract, defang, resolve names and IPs from text☆23Updated 2 weeks ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Updated 11 years ago
- The official LibPrelude GitHub mirror of https://www.prelude-siem.org/projects/libprelude/repository☆12Updated 5 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago