Host-based local vulnerability scanner. Finds installed software on the host, asks their vulnerabilities to vulmon.com API and print vulnerabilities with available exploits. All found exploits can be downloaded by Vulmap.
☆33Aug 1, 2021Updated 4 years ago
Alternatives and similar repositories for Vulmap-Windows
Users that are interested in Vulmap-Windows are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆25Mar 21, 2020Updated 6 years ago
- Tiny WiFi sniffer with Scapy for MAC OS X☆22Oct 18, 2014Updated 11 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- PAKURI has been merged with Python and launched as a new project, PAKURI-THON.☆143Jan 25, 2022Updated 4 years ago
- Leveraging kali Linux, hostapd and dnsmasq to spawn effective access points for wireless penetration tests.☆15Jan 16, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Open-source Exploiting Framework☆32Mar 13, 2017Updated 9 years ago
- A multithread tool to scan for available APs and display their Signal Strength, Security Protocol, SSID and channels. Written in Python (…☆12Jul 6, 2021Updated 4 years ago
- Learning-Pentesting-With-Python☆18Sep 26, 2018Updated 7 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Nov 13, 2021Updated 4 years ago
- ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.☆135Jul 25, 2019Updated 6 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Mar 16, 2026Updated last month
- A simple bash script to bruteforce WPA/WPA2 WiFi password using crunch with Aircrack-ng☆14Jan 1, 2019Updated 7 years ago
- ☆25May 30, 2017Updated 8 years ago
- Fast exploitation based on metasploit.☆74Dec 28, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Simple RAT in C#☆27Apr 11, 2020Updated 6 years ago
- A privilege escalation exploit in the Steam Client☆13Aug 11, 2019Updated 6 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Jul 29, 2020Updated 5 years ago
- Fake SMB and SAMR data☆11Oct 27, 2019Updated 6 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Sep 19, 2018Updated 7 years ago
- Generate a Bitcoin paper wallet offline as a png file, no need for a browser.☆23Mar 27, 2017Updated 9 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- SpooKey is a keylogger written in C++ that uses kernel-level APIs to capture keystrokes (Linux only. Windows is a work in progress)☆31Feb 12, 2020Updated 6 years ago
- A fast python tool for creating permutations of alphanumerics☆11Mar 22, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Scout - a Contactless Active Reconnaissance Tool☆56Dec 8, 2022Updated 3 years ago
- Install and run kali, blackarch, parrot and more... inside the termux udocker container | no root☆14Jul 25, 2025Updated 8 months ago
- A quick reference script that can easily display reverse shells for different languages.☆20May 28, 2020Updated 5 years ago
- This is a basic Python script that accepts a website's url in string format to initiate a DDoS attack. For educational purposes only.☆14Jan 3, 2015Updated 11 years ago
- yt-dlp, the web's most powerful video and audio downloader, now embedded fully in your browser.☆54Mar 17, 2026Updated last month
- Get Group Policy information from ADMX files.☆11Jan 22, 2021Updated 5 years ago
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Apr 13, 2018Updated 8 years ago
- Using a Raspberry Pi and a HackRF One to locate and graph RF signals on a Python3 Flask Web Server☆24May 1, 2019Updated 6 years ago
- 😈 The Demon App Store☆30Aug 18, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A bunch of tricks and configs to configure a work environment for web pentesting☆13Oct 1, 2018Updated 7 years ago
- Sandfly Security Agentless Compromise and Intrusion Detection System For Linux☆90Apr 7, 2026Updated last week
- A tool to automate penetration tests☆384Mar 9, 2024Updated 2 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆33Apr 15, 2021Updated 5 years ago
- Kerberos / Windows AD / Linux PAM password change check against breached lists (HIBP), and other rules☆161Feb 2, 2023Updated 3 years ago
- Chrome extension that disables WebBluetooth☆14Mar 4, 2018Updated 8 years ago
- Open source tool that uses censys and shodan for passive recon.☆13May 20, 2016Updated 9 years ago