Host-based local vulnerability scanner. Finds installed software on the host, asks their vulnerabilities to vulmon.com API and print vulnerabilities with available exploits. All found exploits can be downloaded by Vulmap.
☆33Aug 1, 2021Updated 4 years ago
Alternatives and similar repositories for Vulmap-Windows
Users that are interested in Vulmap-Windows are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆25Mar 21, 2020Updated 6 years ago
- Encryption using 2 Factor Authentication through an external drive with Python☆12Jun 7, 2020Updated 5 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- PAKURI has been merged with Python and launched as a new project, PAKURI-THON.☆142Jan 25, 2022Updated 4 years ago
- Open-source Exploiting Framework☆32Mar 13, 2017Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Scripts for hacking through wireless network [WiFi]☆26Oct 16, 2022Updated 3 years ago
- Learning-Pentesting-With-Python☆18Sep 26, 2018Updated 7 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Nov 13, 2021Updated 4 years ago
- ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.☆135Jul 25, 2019Updated 6 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Mar 16, 2026Updated last week
- Projects For the HackRF One☆14Aug 13, 2014Updated 11 years ago
- ☆25May 30, 2017Updated 8 years ago
- Making shellcode UD - https://osandamalith.com☆25Jul 31, 2016Updated 9 years ago
- A series of Bro Scripts created for detection purposes.☆19Nov 18, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Fast exploitation based on metasploit.☆74Dec 28, 2019Updated 6 years ago
- Simple RAT in C#☆27Apr 11, 2020Updated 5 years ago
- A privilege escalation exploit in the Steam Client☆13Aug 11, 2019Updated 6 years ago
- Web Recon & Exploitation Tool.☆55Mar 8, 2020Updated 6 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Jul 29, 2020Updated 5 years ago
- Fake SMB and SAMR data☆11Oct 27, 2019Updated 6 years ago
- Scanner to send specially crafted requests and catch callbacks of systems that are impacted by log4j log4shell vulnerability and to detec…☆12Feb 15, 2022Updated 4 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Sep 19, 2018Updated 7 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- SpooKey is a keylogger written in C++ that uses kernel-level APIs to capture keystrokes (Linux only. Windows is a work in progress)☆31Feb 12, 2020Updated 6 years ago
- Gopro wifi command hack---a sniff result of Gopro App . The Json file can be used as a Gopro control API. Simply connect to yout Gopro ho…☆15Feb 19, 2016Updated 10 years ago
- Scout - a Contactless Active Reconnaissance Tool☆56Dec 8, 2022Updated 3 years ago
- A quick reference script that can easily display reverse shells for different languages.☆20May 28, 2020Updated 5 years ago
- Install and run kali, blackarch, parrot and more... inside the termux udocker container | no root☆14Jul 25, 2025Updated 8 months ago
- This is a basic Python script that accepts a website's url in string format to initiate a DDoS attack. For educational purposes only.☆14Jan 3, 2015Updated 11 years ago
- 😈 The Demon App Store☆30Aug 18, 2021Updated 4 years ago
- A bunch of tricks and configs to configure a work environment for web pentesting☆13Oct 1, 2018Updated 7 years ago
- A tool to automate penetration tests☆384Mar 9, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆33Apr 15, 2021Updated 4 years ago
- Kerberos / Windows AD / Linux PAM password change check against breached lists (HIBP), and other rules☆161Feb 2, 2023Updated 3 years ago
- Curso realizado por Ricardo Narvaja de CrackLatinos (Mirror) http://ricardonarvaja.info☆12May 28, 2018Updated 7 years ago
- 🎥 Brickcom Private Security Cam's Scan and Exploit Improper view DataBase 📺 Watching priv8 (records 📼) in real time from almost countr…☆21Jan 16, 2019Updated 7 years ago
- Minimal Docker image with Nmap Network Security Scanner pre-installed.☆12Dec 5, 2025Updated 3 months ago
- Python proof-of-concept for breaking passwords with a microphone, using machine learning.☆22Dec 29, 2019Updated 6 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Jun 27, 2019Updated 6 years ago