scmanjarrez / CVEScannerV2Links
Nmap script that scans for probable vulnerabilities based on services discovered in open ports.
☆210Updated 7 months ago
Alternatives and similar repositories for CVEScannerV2
Users that are interested in CVEScannerV2 are comparing it to the libraries listed below
Sorting:
- Nuclei templates for honeypots detection.☆195Updated last year
- A list of dorks for the Netlas.io search engine, with which you can find millions of objects in the boundless IoE. Contains queries to se…☆195Updated 2 months ago
- PacketSpy☆156Updated last year
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆153Updated last month
- Search for all leaked keys/secrets using one regex! bugbounty☆140Updated 6 months ago
- Shodan Dorks 2023☆241Updated 9 months ago
- BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python…☆322Updated last month
- Discover and monitor internet assets using favicon hashes across search engines.☆217Updated 2 weeks ago
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆98Updated last year
- Docker Remote API Scanner and Exploit☆176Updated last year
- ☆315Updated last year
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆157Updated 7 months ago
- InfoHound is an OSINT to extract a large amount of data given a web domain name.☆162Updated 2 weeks ago
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆238Updated last year
- A meta-list of public references to threat actor profiles and APT group datasets.☆71Updated 3 weeks ago
- The Most Advanced Client-Side Prototype Pollution Scanner☆239Updated this week
- Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effe…☆79Updated 6 months ago
- ☆126Updated 4 months ago
- CHOMTE.SH is a powerful shell script designed to automate reconnaissance tasks during penetration testing. It utilizes various Go-based t…☆130Updated 10 months ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆376Updated last year
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆102Updated 2 months ago
- Lightning-fast passive subdomain discovery tool for security professionals and bug bounty hunters.☆380Updated 5 months ago
- A comprehensive Python-based security tool for file scanning, malware detection, and analysis in an ever-evolving cyber landscape.☆111Updated 2 years ago
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆101Updated 2 years ago
- ☆120Updated 10 months ago
- A monster cheatsheet on MITM attacks☆366Updated 4 months ago
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, a…☆98Updated last year
- Discovering Typo Squatting on your domains!☆77Updated last year
- OSINT tool that finds domains, subdomains, directories, endpoints and files for a given seed URL.☆178Updated last year
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Th…☆262Updated 3 months ago