sec-mirror / cis-benchmarksLinks
Mirror - CIS Benchamarks
☆43Updated 5 years ago
Alternatives and similar repositories for cis-benchmarks
Users that are interested in cis-benchmarks are comparing it to the libraries listed below
Sorting:
- Tool to discover external and internal network attack surface☆204Updated last year
- An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.☆183Updated 3 weeks ago
- ☆114Updated 2 years ago
- Scan DockerHub images that match a keyword to find secrets.☆60Updated 4 years ago
- Identify IP addresses owned by public cloud providers☆127Updated last year
- Reconmap's web client written in React. Manage all your pentest projects from a single place.☆51Updated this week
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- An extension to use Semgrep inside Burp Suite.☆89Updated 5 months ago
- PatrowlHears - Vulnerability Intelligence Center / Exploits☆165Updated last week
- Find CVE PoCs on GitHub☆156Updated 3 months ago
- openrisk is a tool that generates a risk score based on the results of a Nuclei scan.☆177Updated this week
- ☆126Updated last year
- Parse .nessus file(s) and shows output in interactive UI☆161Updated 6 months ago
- A simple remote scanner for Atlassian Jira☆121Updated 2 years ago
- Determine the Palo Alto PAN-OS software version of a remote GlobalProtect portal or management interface.☆128Updated last year
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆156Updated 2 years ago
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆30Updated 2 years ago
- WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted se…☆156Updated last year
- A Terraform reproducer for IngressNightmare☆25Updated 7 months ago
- Contains all my research and content produced regarding the log4shell vulnerability☆31Updated 3 years ago
- A utility to convert your AWS CLI credentials into AWS console access.☆249Updated 5 years ago
- ☆44Updated 2 years ago
- ☆141Updated 2 weeks ago
- Repository of CVE found by OCD people☆82Updated 5 months ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆144Updated 2 years ago
- This repository contain any information that can be used to hack Kubernetes☆110Updated 3 years ago
- nse script to inject jndi payloads☆46Updated 3 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆68Updated 6 months ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆143Updated 2 years ago
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 3 years ago