Brutus-AET2 Password-Cracker Network-Security Authentication-Tool Brute-Force-Attack Password-Recovery Penetration-Testing Ethical-Hacking
-
Updated
Jul 7, 2024 - C++
Brutus-AET2 Password-Cracker Network-Security Authentication-Tool Brute-Force-Attack Password-Recovery Penetration-Testing Ethical-Hacking
Collection of reusable references
an IPEnumerationTool combining Shodan and Censys APIs for comprehensive insights. Uncover vulnerabilities, enhance cybersecurity, and streamline analysis with merged results and deduplication.
ASOC, ASPM, DevSecOps, Vulnerability Management Using ArcherySec.
Fast and customizable vulnerability scanner based on simple YAML based DSL.
A list of URLs for security advisories and common-vulnerability-enumeration information (CVEs) to ease the process of finding free, fresh and reliable information about product vulnerabilities.
cve-search - a tool to perform local searches for known vulnerabilities
Activities on Penetration Testing
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
This repository contains the scanner component for Greenbone Community Edition.
CISO360.AI
Greenbone Security Assistant - The web frontend for the Greenbone Community Edition
CveMate is a versatile tool for replicating and enriching the NVD CVE list with additional security data sources, all in a local MongoDB database.
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more.
Powerful and customizable vulnerability scanner based on VDSL, which can replace Nessus or Nuclei, etc. 万象通用漏洞扫描器,支持强大的PoC脚本语言、先进易用的PoC开发和调试IDE、现代化无需等待OOB服务器。可替代Nessus和Nuclei等漏洞扫描产品。
Remote control your Greenbone Community Edition or Greenbone Enterprise Appliance
Random Notes - No Source Code
A tool to automate the vulnerability assessment process for small to medium-sized enterprises. It uses OWASP ZAP for scanning and Tkinter for the user interface.
Add a description, image, and links to the vulnerability-assessment topic page so that developers can more easily learn about it.
To associate your repository with the vulnerability-assessment topic, visit your repo's landing page and select "manage topics."