巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
-
Updated
Apr 16, 2024 - Python
巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
cve-search - a tool to perform local searches for known vulnerabilities
A high performance offensive security tool for reconnaissance and vulnerability scanning
🆕 The Multi-Tool Web Vulnerability Scanner.
vulnx 🕷️ an intelligent Bot, Shell can achieve automatic injection, and help researchers detect security vulnerabilities CMS system. It can perform a quick CMS security detection, information collection (including sub-domain name, ip address, country information, organizational information and time zone, etc.) and vulnerability scanning.
Security Manage Framwork is a security management platform for enterprise intranet, which includes asset management, vulnerability management, account management, knowledge base management, security scanning automation function modules, and can be used for internal security management. This platform is designed to help Party A with fewer securit…
Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases.
NERVE Continuous Vulnerability Scanner
Watchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.
Detect, analyze and uniquely identify crashes in Windows applications
Remote control your Greenbone Community Edition or Greenbone Enterprise Appliance
An asynchronous enumeration & vulnerability scanner. Run all the tools on all the hosts.
《白帽子讲Web扫描》书籍参考代码
A Binary Ninja plugin for vulnerability research.
A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
Detects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.
Microsoft Azure Exploitation Framework
Scout - a Contactless Active Reconnaissance Tool
Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploitability (runtime execution, configuration, permissions, existence of a mitigation, OS, etc..)
Abandoned. This repository is not used anymore.
Add a description, image, and links to the vulnerability-assessment topic page so that developers can more easily learn about it.
To associate your repository with the vulnerability-assessment topic, visit your repo's landing page and select "manage topics."