Useful SQL queries for Nexpose
☆19Jul 4, 2017Updated 8 years ago
Alternatives and similar repositories for Nexpose-SQL-queries
Users that are interested in Nexpose-SQL-queries are comparing it to the libraries listed below
Sorting:
- InsightVM PostgreSQL Reports, Queries, ETC.☆26Mar 24, 2023Updated 2 years ago
- Scripts, SQL queries, and other resources for Nexpose☆30Mar 3, 2025Updated 11 months ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Mar 9, 2025Updated 11 months ago
- WebAMS is an Open Source web application for reporting and resolving incidents or tickets☆10Dec 11, 2022Updated 3 years ago
- A map of the botnet attacking our server☆14Aug 24, 2017Updated 8 years ago
- ☆32Feb 3, 2026Updated 3 weeks ago
- A magnet u-joint arms and effector for the Rostock delta 3d printer.☆20May 31, 2013Updated 12 years ago
- OpenCTI Add-On for Splunk☆13Jan 13, 2026Updated last month
- Transforms for the AlienVault OTX service☆39Nov 3, 2016Updated 9 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- ☆11Feb 11, 2024Updated 2 years ago
- Walkie Talkie with Arduino Nano and nRF24L01☆10Sep 16, 2022Updated 3 years ago
- Chef Cookbook which provisions apache+mod_security+owasp-crs☆37Jun 20, 2018Updated 7 years ago
- Post-Exploitation methods inside any extension, Presented @DEFCON29: "Extension-Land exploits and rootkits in your browser extensions".☆11Nov 29, 2021Updated 4 years ago
- ☆20Feb 5, 2026Updated 3 weeks ago
- Scan systems and docker images for potential spring4shell vulnerabilities. Will detect in-depth (layered archives jar/zip/tar/war and sca…☆11Apr 2, 2022Updated 3 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 4 years ago
- Collection of rules for Static Application Security Testing (SAST) with Semgrep☆12Apr 16, 2025Updated 10 months ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Dec 29, 2021Updated 4 years ago
- Various components we use in labs☆10Oct 30, 2020Updated 5 years ago
- FTP client for humans.☆10Oct 11, 2015Updated 10 years ago
- Update an ECS service to use a new Docker image☆13Feb 21, 2026Updated last week
- React UI☆11Jan 4, 2023Updated 3 years ago
- Install guide for putting Debian GNU/Linux on a PogoPlug Pro☆10Jan 19, 2023Updated 3 years ago
- A Docker lab integrating Splunk SIEM with Ollama LLM via Model Context Protocol for AI-powered security operations. Features Promptfoo e…☆18Aug 17, 2025Updated 6 months ago
- Gampung tools for find nuclei template from github☆11Sep 6, 2023Updated 2 years ago
- ☆23Feb 27, 2025Updated last year
- A Pentesters Confluence Keyword Scanner☆17Dec 3, 2024Updated last year
- Work in progress LLM framework.☆15Oct 31, 2024Updated last year
- ☆18Feb 19, 2025Updated last year
- Provides a method unix_time which returns elapsed time since UNIX EPOCH. The returned time can be faked in each thread separately.☆12May 19, 2021Updated 4 years ago
- This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.3☆12Jan 23, 2020Updated 6 years ago
- Nuclei is a fast tool for configurable targeted vulnerability scanning based on templates offering massive extensibility and ease of use.☆13Aug 4, 2025Updated 6 months ago
- Set of useful scrpts☆10Jan 4, 2015Updated 11 years ago
- ☆20Feb 10, 2026Updated 2 weeks ago
- hMailServer Password Decrypter☆12Nov 14, 2016Updated 9 years ago
- STIX 2 Fake Data Generator☆11Oct 17, 2024Updated last year
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago