Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for security vulnerability assessment
security
x
vulnerability-assessment
x
33 search results found
Nuclei
⭐
16,189
Fast and customizable vulnerability scanner based on simple YAML based DSL.
Vuls
⭐
10,487
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Vulscan
⭐
2,983
Advanced vulnerability scanning with Nmap NSE
Xunfeng
⭐
2,946
巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
Secure Ios App Dev
⭐
1,338
Collection of the most common vulnerabilities found in iOS applications
Jackhammer
⭐
599
Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
Hellraiser
⭐
551
Vulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Bugid
⭐
493
Detect, analyze and uniquely identify crashes in Windows applications
Securitymanageframwork
⭐
421
Security Manage Framwork is a security management platform for enterprise intranet, which includes asset management, vulnerability management, account management, knowledge base management, security scanning automation function modules, and can be used for internal security management. This platform is designed to help Party A with fewer security personnel, complicated business lines, difficult periodic inspection and low automation to better achieve internal safety management.
Vulnrepo
⭐
364
VULNRΞPO - Free vulnerability report generator and repository end-to-end encrypted. Complete templates of issues, CWE, CVE, MITRE ATT&CK, PCI DSS, issues import Nmap/Nessus/Burp/OpenVAS/Bugcrowd/Trivy, Jira export, TXT/JSON/MARKDOWN/HTML/PDF report, attachments, automatic changelog, statistics, vulnerability management, methodologies and much more!
Watchdog
⭐
309
Watchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.
Mageni
⭐
251
Open-source vulnerability scanner
Gsa
⭐
196
Greenbone Security Assistant - The web frontend for the Greenbone Community Edition
Nerve
⭐
140
NERVE Continuous Vulnerability Scanner
Mi X
⭐
138
Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploitability (runtime execution, configuration, permissions, existence of a mitigation, OS, etc..)
Wordpress Scanner
⭐
133
Wordpress Vulnerability Scanner
Offensive Payloads
⭐
127
List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.
Vailyn
⭐
126
A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
Minions
⭐
95
Distributed filesystem scanner
Purify
⭐
76
All-in-one tool for managing vulnerability reports from AppSec pipelines
Libellux Up And Running
⭐
53
Libellux: Up & Running provides documentation on how-to install open-source software from source. The focus is Zero Trust Network to enhance the security for existing applications or install tools to detect and prevent threats.
Security Assessment
⭐
44
Scripts to automate some part of Security/Vulnerability Assessment
Nuclei Plugin
⭐
13
Nuclei is a fast tool for configurable targeted vulnerability scanning based on templates offering massive extensibility and ease of use.
Awesome Security Resources
⭐
12
Vulnerability Assessment and Penetration Testing Tools (Information Security / Cyber security)
Actions Log4j
⭐
11
A GitHub Action that scans your public web applications for log4j vulnerabilities after every deployment. Add this to your dev, staging and prod steps and SecureStack will make sure that what you've just deployed is secure and meets your requirements.
References
⭐
10
Collection of reusable references
Windows Fingerprint Powershell
⭐
8
This script is used as a supplement to vulnerability assessment tools such as Nessus, Retina, and various other scanners that are used in the industry. The script collects data specfic to the network, firewall configuration (host based), audit logs (security, system, application) and other information that can be useful in determining false positives during a vulnerability assessment. I created to tool to negate having to take numerous screen shots or going to different places to pull data ma
Image Layer Provenance
⭐
8
Container image provenance spec that allows tracing CVEs detected in registry images back to a CVE's source of origin.
Senluo
⭐
7
Super fast and lightweight senluo cyberspace search engine. 轻量级、高性能的森罗网络空间测绘引擎。
Penetration Testing Methodology
⭐
6
Penetration Testing Methodology - short notes
Ivan
⭐
5
Falcon Image Vulnerability Analysis (IVAN) is a command-line image assessment tool.
Deep Security Smart Check Scan Action
⭐
5
🔍 For scanning your images as part of your CI pipeline using Cloud One Container Security (Formerly Deep Security Smart Check)
Security Bugtracker
⭐
5
Run security test tools and track bugs easily
Related Searches
Security Vulnerabilities (12,317)
Laravel Security (11,580)
Php Security (10,611)
Python Security (3,208)
Javascript Security (2,980)
Java Security (2,469)
Html Security (2,284)
Golang Security (1,255)
Shell Security (1,214)
C Security (886)
1-33 of 33 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.