talsoft / vuldashLinks
Vulnerability Dashboard
☆31Updated 7 years ago
Alternatives and similar repositories for vuldash
Users that are interested in vuldash are comparing it to the libraries listed below
Sorting:
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆108Updated 3 years ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆69Updated 7 months ago
- PatrowlHears - Vulnerability Intelligence Center / Exploits☆166Updated this week
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Updated 4 years ago
- PenText system: Easily create beautiful looking penetration test quotes, reports, and documents in many formats (PDF, text, JSON, CSV, ..…☆132Updated 4 months ago
- Security tools report parsers for Faradaysec.com☆58Updated last week
- Reconnaissance tool for GitLab and GitHub organizations☆53Updated 2 years ago
- Squatm3 is a python tool designed to enumerate available domains generated modifying the original domain name through different technique…☆43Updated last month
- ADAPT is a tool that performs automated Penetration Testing for WebApps.☆193Updated 6 years ago
- 🧮 An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessment☆163Updated 4 years ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆149Updated 3 years ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆65Updated 2 years ago
- A tool to hunt for publicly accessible DigitalOcean Spaces☆156Updated 6 years ago
- A Report Generation Tool for Security Assessment☆65Updated 7 years ago
- AWS S3 Bucket/Object Finder☆123Updated 4 years ago
- Cloud Security Operations Orchestrator☆188Updated last year
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆65Updated 6 years ago
- A jupyter notebook that contains the main commands executed during a penetration test☆73Updated 5 years ago
- Visualize networks of phishing by querying the phishstats.info API☆79Updated last year
- ☆132Updated 4 years ago
- An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.☆183Updated this week
- Typosquatting tool that supports OSINT investigations, and designed to operate on multilingual target domains.☆25Updated 8 months ago
- Python script to check HTTP security headers☆68Updated 2 months ago
- ☆101Updated 3 weeks ago
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆94Updated 2 years ago
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU☆118Updated 3 weeks ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 4 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆80Updated 6 years ago
- Automatically exported from code.google.com/p/nipper-ng☆73Updated 3 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆142Updated 3 years ago