scmanjarrez / CVEScannerV2Links
Nmap script that scans for probable vulnerabilities based on services discovered in open ports.
☆220Updated 10 months ago
Alternatives and similar repositories for CVEScannerV2
Users that are interested in CVEScannerV2 are comparing it to the libraries listed below
Sorting:
- Nuclei templates for honeypots detection.☆198Updated 2 years ago
- Docker Remote API Scanner and Exploit☆180Updated 2 years ago
- BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python…☆333Updated 5 months ago
- A list of dorks for the Netlas.io search engine, with which you can find millions of objects in the boundless IoE. Contains queries to se…☆200Updated 6 months ago
- PacketSpy☆157Updated last year
- Lightning-fast passive subdomain discovery tool for security professionals and bug bounty hunters.☆404Updated last month
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, a…☆98Updated last year
- ☆124Updated last year
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆105Updated last year
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆243Updated last year
- Discover and monitor internet assets using favicon hashes across search engines.☆223Updated 4 months ago
- Shodan Dorks 2023☆245Updated last year
- MITM Field Manual☆368Updated last month
- ☆105Updated 2 years ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆379Updated 2 years ago
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆275Updated last year
- Repository contains a collection of scripts designed to demonstrate and exploit various vulnerabilities in HTTP and related protocols☆30Updated 2 months ago
- ☆137Updated 4 years ago
- Next Generation DorX. Built by Dorks, for Dorks. 🤓☆110Updated 2 years ago
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆108Updated 5 months ago
- Search for all leaked keys/secrets using one regex! bugbounty☆182Updated 10 months ago
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆171Updated 10 months ago
- Search & Parse Password Leaks☆415Updated last year
- Friendly graphical output of the nmap tool that allows filtering by open ports☆185Updated 3 years ago
- Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effe…☆86Updated 2 weeks ago
- A fast network scanning tool to detect open ports and security vulnerabilities (Compatible with Debian & Red Hat OS)☆125Updated 5 months ago
- Cisco IOS Security Inspector☆40Updated last month
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser au…☆92Updated last year
- The Most Advanced Client-Side Prototype Pollution Scanner☆245Updated last week
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆102Updated 2 years ago