sec-mirror / cis-benchmarksLinks
Mirror - CIS Benchamarks
☆41Updated 4 years ago
Alternatives and similar repositories for cis-benchmarks
Users that are interested in cis-benchmarks are comparing it to the libraries listed below
Sorting:
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆75Updated 2 years ago
- An extension to use Semgrep inside Burp Suite.☆89Updated last month
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 3 years ago
- Tool to discover external and internal network attack surface☆198Updated last year
- Nessus Audit files☆33Updated 2 years ago
- Contains all my research and content produced regarding the log4shell vulnerability☆31Updated 3 years ago
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- ☆111Updated 2 years ago
- Default plugins for Jaeles Scanner☆34Updated 4 years ago
- Determine privileges from cloud credentials via brute-force testing.☆69Updated 10 months ago
- Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a …☆40Updated 2 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- A simple remote scanner for Atlassian Jira☆121Updated 2 years ago
- OWASP Foundation Web Respository☆36Updated 3 years ago
- A fingerprint generation helper for nuclei network templates☆75Updated 2 years ago
- CVE-2020-2021☆21Updated 4 years ago
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆29Updated 2 years ago
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 2 years ago
- Virtual Security Operations Center☆51Updated last year
- ☆36Updated 5 years ago
- Repository of CVE found by OCD people☆77Updated last week
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- A selection of rebuilt and from scratch exploits, scripts and ideas that can be used in red-teaming scenarios.☆5Updated last year
- ☆30Updated last year
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Updated 9 months ago
- Oracle Database Penetration Testing Reference (10g/11g)☆36Updated 6 years ago
- Citrix Scanner for CVE-2023-3519☆51Updated last year
- Tool to automate corporate network segmentation test☆20Updated 4 years ago
- ☆23Updated 2 years ago