simplevulnerabilitymanager / svm
Program to perform vulnerability analysis and automatically generate a report
☆56Updated 2 years ago
Alternatives and similar repositories for svm:
Users that are interested in svm are comparing it to the libraries listed below
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆98Updated 6 years ago
- CPH:SEC WAES: Web Auto Enum & Scanner - Auto enums website(s) and dumps files as result☆70Updated last year
- Script to automate, manage, and multithread Nikto scans.☆59Updated 5 years ago
- A Report Generation Tool for Security Assessment☆64Updated 6 years ago
- Listing subdomains about a main domain☆58Updated 6 years ago
- Automated Tools Pentest☆7Updated last year
- Vulnerable OS Collection is a collection of four Ubuntu based OSes containing real world vulnerable web applications.☆58Updated 7 years ago
- Cross-Site-Scripting (XSS) Automatic Scanner☆43Updated 4 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆83Updated 6 years ago
- My collection of nmap nse modules☆63Updated 5 years ago
- Generate MS Word template-based reports with HP WebInspect / Burp Suite Pro input, own custom data and knowledge base.☆66Updated last year
- Framework for exploiting local vulnerabilities☆84Updated last year
- dork scanner with Sqli and Lfi testing☆29Updated 6 years ago
- Pillage a git repo found in an accessible web root☆61Updated 13 years ago
- SuperNES - Super Nmap Easy Scanner☆10Updated 6 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Updated 4 years ago
- Python-based CLI Password Analyser (Reporting Tool)☆33Updated 3 years ago
- A simple shell script which utilizes nmap, nikto, dirb, enum4linux and other open source goodies to automate enumeration process.☆20Updated 3 years ago
- My Dirty Scriptss ..!!!!! Pentest , OSINT , Python ,, Trainings☆53Updated 6 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- Various tools for managing bug bounty recon and exploration.☆47Updated 2 years ago
- ☆12Updated 2 years ago
- A collection of scripts from around the web to be used with OSCP☆11Updated 8 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆43Updated 9 years ago
- Collection of scripts that aid in penetration testing of JSON Web Tokens☆58Updated 6 years ago
- Search drives for documents containing passwords☆62Updated 10 years ago
- ☆60Updated 7 years ago
- ☆46Updated 5 years ago
- Automate Metasploit scanning and exploitation☆115Updated 5 months ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 6 years ago