Agent scanner for vulners.com
☆95Nov 2, 2025Updated 4 months ago
Alternatives and similar repositories for vulners-agent
Users that are interested in vulners-agent are comparing it to the libraries listed below
Sorting:
- Vulnerability scanner based on vulners.com audit API☆65Jul 25, 2018Updated 7 years ago
- Vulners Python API wrapper☆372Feb 26, 2026Updated 3 weeks ago
- a python tool used to scan for Open redirection vulnerability☆20Dec 29, 2017Updated 8 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Sep 25, 2017Updated 8 years ago
- OhNo - The Evil Image Builder & Meta Manipulator☆11Jun 5, 2014Updated 11 years ago
- Burp scanner plugin based on Vulners.com vulnerability database☆25Jul 10, 2017Updated 8 years ago
- Burp suite HTTP history advanced search☆10Mar 20, 2018Updated 8 years ago
- NSE script based on Vulners.com API☆3,368Sep 26, 2025Updated 5 months ago
- Just an experiment with hash cracking :) few password lists along with some good password cracking rule sets.☆13Feb 29, 2020Updated 6 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 4 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 4 years ago
- Vulners signature-base software version detection rules☆38Nov 9, 2021Updated 4 years ago
- ip-keyloger☆10Jan 9, 2026Updated 2 months ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 7 years ago
- CVE-2018-19276 - OpenMRS Insecure Object Deserialization RCE☆16Mar 11, 2019Updated 7 years ago
- P2P cryto-currency with dashpay and blackcoin Hybird feature☆12Feb 28, 2022Updated 4 years ago
- ☆11Nov 5, 2022Updated 3 years ago
- C# code for Transferring Backdoor Payloads by ARP Traffic and Bypassing Anti-viruses (Slow)☆44Jun 5, 2023Updated 2 years ago
- NetSPI HTTP Scrapers☆29Jul 9, 2019Updated 6 years ago
- ☆12Mar 4, 2023Updated 3 years ago
- Python-Based Log Analyzer That Detects Brute-Force Attacks, Directory Traversal, And Suspicious Behavior In System Or Web Server Logs. B…☆19Apr 30, 2025Updated 10 months ago
- Vulnerability scanner based on vulners.com audit API☆199Sep 2, 2018Updated 7 years ago
- Tool to dump cisco device configs via snmp and/or add new users☆13Mar 10, 2026Updated last week
- This is a wallet analysis tool designed for building and testing strategies. It comes with powerful features, including: 🧨Exporting PnL …☆14Oct 13, 2025Updated 5 months ago
- ☆16Oct 24, 2018Updated 7 years ago
- NOGO is a packaging script that creates fully undetectable payloads specializing in disabling anti-virus. Created for pentesting (crippli…☆11Apr 23, 2019Updated 6 years ago
- ☆11Mar 2, 2019Updated 7 years ago
- bash script to enumerate vulnerabilities on specific year through Shodan API☆46Dec 5, 2018Updated 7 years ago
- Powershell modules and commands that come in handy for pentests and red team assessments.☆20Oct 31, 2018Updated 7 years ago
- Vulnerability scanner based on vulners.com search API☆887Oct 1, 2025Updated 5 months ago
- Acherus, The Docker Hold, is a containerized hacking environment gathering many tools and resources☆15Dec 29, 2025Updated 2 months ago
- Main files for the Hak5 LAN Turtle☆15Jul 26, 2015Updated 10 years ago
- A sample web application with Clickjacking vulnerabilities and its attacker website.☆12Feb 10, 2022Updated 4 years ago
- ☆110Jan 26, 2026Updated last month
- Script to check Kali Linux configs☆25Jan 14, 2019Updated 7 years ago
- ☆66Feb 10, 2018Updated 8 years ago
- Sample code snippets for consuming the CloudSploit API☆13Nov 10, 2023Updated 2 years ago
- ☆17Apr 5, 2021Updated 4 years ago
- GNU/Linux version of the https://github.com/inquisb/icmpsh slave☆22Feb 11, 2020Updated 6 years ago