Vise

A search engine on information delivered by OSINT sources to support Vulnerability Assessment
Alternatives To Vise
Project NameStarsDownloadsRepos Using ThisPackages Using ThisMost Recent CommitTotal ReleasesLatest ReleaseOpen IssuesLicenseLanguage
H4cker15,693
2 months ago2mitJupyter Notebook
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more.
Nuclei Templates7,614
2 months ago112mitJavaScript
Community curated list of templates for the nuclei engine to find security vulnerabilities.
Ysoserial7,002
3 months ago55mitJava
A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
Awesome Hacker Search Engines6,307
2 months ago10mitShell
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
Cve5,806
2 months ago13mitHTML
Gather and update all available and newest CVEs with their PoC.
Poc In Github5,704
2 months ago12
📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.
Linux Kernel Exploitation5,116
3 months agocc-by-4.0
A collection of links related to Linux kernel security and exploitation
Jwt_tool4,639
3 months ago50gpl-3.0Python
:snake: A toolkit for testing, tweaking and cracking JSON Web Tokens
Wesng3,789
3 months ago3November 10, 202111bsd-3-clausePython
Windows Exploit Suggester - Next Generation
Cdk3,267
5 months ago35March 12, 202314apache-2.0Go
📦 Make security testing of K8s, Docker, and Containerd easier.
Alternatives To Vise
Select To Compare


Alternative Project Comparisons
Popular Vulnerabilities Projects
Popular Exploitation Projects
Popular Security Categories
Related Searches

Get A Weekly Email With Trending Projects For These Categories
No Spam. Unsubscribe easily at any time.
Python
Vulnerabilities
Exploitation
Cybersecurity
Cve
Vulnerability Assessment