scmanjarrez / CVEScannerV2Links
Nmap script that scans for probable vulnerabilities based on services discovered in open ports.
☆219Updated 10 months ago
Alternatives and similar repositories for CVEScannerV2
Users that are interested in CVEScannerV2 are comparing it to the libraries listed below
Sorting:
- Nuclei templates for honeypots detection.☆196Updated 2 years ago
- Lightning-fast passive subdomain discovery tool for security professionals and bug bounty hunters.☆404Updated last month
- A list of dorks for the Netlas.io search engine, with which you can find millions of objects in the boundless IoE. Contains queries to se…☆197Updated 6 months ago
- Docker Remote API Scanner and Exploit☆180Updated 2 years ago
- BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python…☆333Updated 4 months ago
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆243Updated last year
- PacketSpy☆157Updated last year
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆378Updated 2 years ago
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, a…☆98Updated last year
- Shodan Dorks 2023☆244Updated last year
- The Most Advanced Client-Side Prototype Pollution Scanner☆243Updated last week
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆154Updated 4 months ago
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆105Updated last year
- OSINT tool that finds domains, subdomains, directories, endpoints and files for a given seed URL.☆181Updated last year
- Discover and monitor internet assets using favicon hashes across search engines.☆223Updated 3 months ago
- ☆124Updated last year
- TerminatorZ is a highly sophisticated and efficient web security tool that scans for top potential vulnerabilities with known CVEs in you…☆293Updated last year
- Search for all leaked keys/secrets using one regex! bugbounty☆183Updated 10 months ago
- ☆317Updated last year
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆108Updated 5 months ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- ☆106Updated 2 years ago
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆102Updated 2 years ago
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆299Updated 2 years ago
- GBounty is a multi-step website vulnerability scanner developed in Golang designed to help companies, pentesters, and bug hunters identif…☆160Updated 5 months ago
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆275Updated last year
- MITM Field Manual☆368Updated 3 weeks ago
- This tool will check for Sensitive Data Leakage with some useful patterns/RegEx. The patterns are mostly targeted on waybackdata and filt…☆229Updated 8 months ago
- hauditor is a tool designed to analyze the security headers returned by a web page.☆176Updated last year
- Cisco IOS Security Inspector☆40Updated last month