sec-mirror / cis-benchmarksLinks
Mirror - CIS Benchamarks
☆44Updated 5 years ago
Alternatives and similar repositories for cis-benchmarks
Users that are interested in cis-benchmarks are comparing it to the libraries listed below
Sorting:
- Tool to discover external and internal network attack surface☆203Updated last year
- An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.☆183Updated this week
- Static code analysis tool based on Elasticsearch☆130Updated 5 years ago
- Scan DockerHub images that match a keyword to find secrets.☆60Updated 4 years ago
- WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted se…☆156Updated last year
- Find CVE PoCs on GitHub☆160Updated 6 months ago
- Reconmap's web client written in React. Manage all your pentest projects from a single place.☆52Updated last week
- ☆127Updated last year
- ☆114Updated 2 years ago
- Identify IP addresses owned by public cloud providers☆125Updated last year
- An extension to use Semgrep inside Burp Suite.☆89Updated 8 months ago
- Tools to assess DNS security.☆153Updated last year
- A simple remote scanner for Atlassian Jira☆121Updated 3 years ago
- openrisk is a tool that generates a risk score based on the results of a Nuclei scan.☆181Updated last month
- Contains all my research and content produced regarding the log4shell vulnerability☆31Updated 4 years ago
- Parse .nessus file(s) and shows output in interactive UI☆163Updated last month
- Citrix Scanner for CVE-2023-3519☆53Updated 2 years ago
- Tools to assess the DNS security of web applications☆128Updated 3 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆70Updated 8 months ago
- This repository contain any information that can be used to hack Kubernetes☆111Updated 3 years ago
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆50Updated 2 years ago
- Determine privileges from cloud credentials via brute-force testing.☆68Updated last year
- A GraphQL enumeration and extraction tool☆134Updated 3 years ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆156Updated 2 years ago
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 3 years ago
- First iteration of ML based Feedback WAF☆59Updated last year
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆31Updated 2 years ago
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆190Updated 3 years ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆142Updated 3 years ago
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Updated last year