tenable / pedantLinks
A static analysis framework for NASL.
☆14Updated 2 years ago
Alternatives and similar repositories for pedant
Users that are interested in pedant are comparing it to the libraries listed below
Sorting:
- A documentation generator for NASL.☆18Updated 3 years ago
- A parser for NASL.☆46Updated 2 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 6 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Updated 7 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Updated 9 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Updated 7 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Updated 9 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 5 years ago
- Flash crossdomain policy security checker☆26Updated 10 years ago
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCP☆13Updated 7 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- Proof of concept for vulnerability management of Docker containers☆16Updated 8 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 9 years ago
- ☆16Updated 9 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30Updated 9 years ago
- REST/JSON interface to Burp Suite☆33Updated 5 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Updated 8 years ago
- Gandcrab v5.2 decryption scripts☆15Updated 5 years ago
- Ccollection of Linux loadable kernel modules aimed to logs any user action☆26Updated 6 years ago
- A fuzzing script for MitmProxy☆23Updated 10 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 7 years ago
- 🛡 Monitor, analyze, & report security misconfigurations across environments.☆18Updated 7 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated last year
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Updated 10 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 8 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Updated 3 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Updated 6 years ago