tholian-network / vulnerabilitiesLinks
A vulnerabilities database for fully-automated audits
☆16Updated 2 years ago
Alternatives and similar repositories for vulnerabilities
Users that are interested in vulnerabilities are comparing it to the libraries listed below
Sorting:
- Network Policy Helper☆30Updated 2 weeks ago
- ☆18Updated 2 years ago
- Hybrid memory/disk map☆62Updated last week
- A fast GitHub stargazers information gathering tool☆72Updated 3 years ago
- IP/FQDN data structure helper with randomization of hosts and ports based on masscan internal logic☆69Updated last year
- A command based package for simple display of statistics☆25Updated last year
- 🔐 teler Proxy enabling seamless integration with teler WAF 🛡️ to protect locally running web service against a web-based attacks. 🥷☆52Updated 11 months ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆58Updated last year
- roundrobin with configurable rotating strategies☆15Updated 2 years ago
- Small Helper Library to increase automatically the file descriptors limits for the current process☆24Updated 2 years ago
- PoC List☆10Updated 3 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆23Updated 3 years ago
- Fast and passive subdomain enumeration.☆19Updated 3 years ago
- A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit.☆18Updated 4 years ago
- A fast port scanner written in go with a focus on reliability and simplicity.☆21Updated last year
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆29Updated 2 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆36Updated 2 weeks ago
- Leaky Vessels Dynamic Detector☆103Updated 9 months ago
- Static detection tool for runc and Docker "Leaky Vessels" vulnerabilities☆96Updated 5 months ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 7 years ago
- Free listening port from the OS☆29Updated last year
- Build wordlists from the common-crawl index☆12Updated 3 years ago
- Store and retrieve your passwords from a secure offline database. Check if your passwords has leaked previously to prevent targeted passw…☆33Updated 2 years ago
- A Network Automation framework focused on Cyber-Security☆46Updated 2 years ago
- Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.☆89Updated 3 years ago
- ES ToolKit is a standalone solution to navigate and backup data for a wide range of Elasticsearch and Kibana versions.☆88Updated 2 years ago
- Burp plugin for the 1Password session protocol for use by security researchers.☆76Updated 8 months ago
- Subdomain enumeration using Cloudflare's scanning tool.☆47Updated 6 months ago
- Chat GPT Things by Taylor Newsome☆12Updated last year
- Automated privilege escalation of the world's most popular Docker images.☆69Updated 2 years ago