vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization, for teams to make more informed decision about what (vulnerability/ties) they should remediate (or can afford not to) and on which (asset/s)
☆69Jul 9, 2025Updated 7 months ago
Alternatives and similar repositories for vPrioritizer
Users that are interested in vPrioritizer are comparing it to the libraries listed below
Sorting:
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- ☆46Mar 20, 2021Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Sep 25, 2020Updated 5 years ago
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Mar 14, 2021Updated 4 years ago
- Automated Security Risk Identification Using AutomationML-based Engineering Data☆31Jul 24, 2022Updated 3 years ago
- asnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the …☆25Jan 6, 2021Updated 5 years ago
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆108Jan 11, 2023Updated 3 years ago
- A forensic evidence acquirer☆86Apr 14, 2021Updated 4 years ago
- NERVE Continuous Vulnerability Scanner☆456Dec 6, 2023Updated 2 years ago
- Webshell, Virtual Private Server (VPS) and cPanel Database☆39Sep 2, 2022Updated 3 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Nov 13, 2021Updated 4 years ago
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 4 months ago
- Automated Scanning, Pentesting , Exploiting and Reporting☆21Nov 21, 2021Updated 4 years ago
- JSON RSA to HMAC and None Algorithm Vulnerability POC☆63Feb 24, 2020Updated 6 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- ☆24Apr 16, 2019Updated 6 years ago
- Cobalt Strike automation scripts collection☆12Oct 28, 2020Updated 5 years ago
- Miscellaneous parsing scripts for penetration testing☆12Jul 17, 2023Updated 2 years ago
- Router socks. One port socks for all the others.☆69May 22, 2024Updated last year
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Jun 17, 2023Updated 2 years ago
- ☆14Mar 5, 2021Updated 4 years ago
- A blazing fast, highly customizable, modern-day defence tool using (in memory) SQL & REST/gRPC protocols.☆20Mar 13, 2024Updated last year
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- Cloud Security Operations Orchestrator☆188Apr 17, 2024Updated last year
- ATTPwn☆217Mar 9, 2024Updated last year
- Security checks for your researches☆34Nov 22, 2020Updated 5 years ago
- WordPress version scanner written in Python.☆15Jun 18, 2024Updated last year
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- ☆15Jan 10, 2019Updated 7 years ago
- wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themes☆15Oct 20, 2018Updated 7 years ago
- An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.☆182Updated this week
- GO sandbox to run untrusted code☆42Jan 17, 2020Updated 6 years ago
- Repository for the Open Information Security Risk Universe☆64Jul 10, 2022Updated 3 years ago
- Unicode encoding attacks with machine learning☆98Nov 25, 2021Updated 4 years ago
- The pentest companion☆15Sep 1, 2021Updated 4 years ago
- Security Assessment Report geNerated Automatically☆41Sep 26, 2024Updated last year
- automated password spraying tool☆148Jun 15, 2021Updated 4 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Feb 11, 2020Updated 6 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆20Dec 8, 2022Updated 3 years ago