Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for vulnerability detection
vulnerability-detection
x
223 search results found
Deemon
⭐
54
Deemon is a tool to detect CSRF in web applications. Deemon has been used for the paper "Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs" by G. Pellegrino, M. Johns, S. Koch, M. Backes, and C. Rossow.
Jaw
⭐
52
JAW: A Graph-based Security Analysis Framework for Client-side JavaScript
Gpscvuldetector
⭐
52
Combining Graph Neural Networks with Expert Knowledge for Smart Contract Vulnerability Detection (TKDE 2021 Accepted)
Amevuldetector
⭐
49
Smart Contract Vulnerability Detection From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion (IJCAI-21 Accepted)
Ronin Vulns
⭐
49
Tests URLs for Local File Inclusion (LFI), Remote File Inclusion (RFI), SQL injection (SQLi), and Cross Site Scripting (XSS), Server Side Template Injection (SSTI), and Open Redirects.
Falco_extended_rules
⭐
49
Curating Falco rules with MITRE ATT&CK Matrix
Osv Detector
⭐
48
Buffer Overflow Vulnerability Services Tester Tool
⭐
46
Ivan Ricart Borges - Program to detect the existence of remote/local stack-based buffer-overflow vulnerabilities using the standard communication protocol for each service.
Wazuh Splunk
⭐
45
Wazuh - Splunk App
Zap Scripts
⭐
45
Zed Attack Proxy Scripts for finding CVEs and Secrets.
Openvas Smb
⭐
45
SMB module for OpenVAS Scanner
Sql_injection_payload
⭐
42
SQL Injection Payload List
Patton Cli
⭐
42
The knife of the Admin & Security auditor
Jenkins Cve 2016 0792
⭐
42
Exploit for Jenkins serialization vulnerability - CVE-2016-0792
Nuclei And Subfinder Api
⭐
42
Web API for nuclei and subfinder will help you automate your entire security testing workflow since you can host it anywhere and make it accessible.
Timeless Timing Attacks
⭐
41
A Python implementation that facilitates finding timeless timing attack vulnerabilities.
Vex
⭐
39
vexctl is a tool to attest VEX impact statements
Xattacker
⭐
39
X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Iust_deep_fuzz
⭐
39
Advanced file format fuzzer based-on deep neural language models.
Wazuh Puppet
⭐
38
Wazuh - Puppet module
Dependency Check Py
⭐
37
🔐 Shim to easily install OWASP dependency-check-cli into Python projects
Wazuh Cloudformation
⭐
36
Wazuh - Amazon AWS Cloudformation
Oste Meta Scan
⭐
35
The OSTE meta scanner is a comprehensive web vulnerability scanner that combines multiple DAST scanners, including Nikto Scanner, OWASP ZAP, Nuclei, SkipFish, and Wapiti.
Domclobbering
⭐
34
DOM Clobbering Wiki, Browser Testing, and Payload Generation
Ubsym
⭐
32
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
Nutoscan
⭐
31
An Automated Mass Network Vulnerability Scanner and Recon Tool
Cloudbeat
⭐
29
Analyzing Cloud Security Posture
Vulnerabilities
⭐
29
Some of the vulnerabilities that were found by Cybellum platform
Munch
⭐
28
Greybox fuzzer for optimizing function coverage and finding low-level vulnerabilities in C programs
Autofix
⭐
28
Static Analysis meets Large Language Models
Itwsv
⭐
28
ITWSV- Integrated Tool for Web Security Vulnerability
Nowsecure Action
⭐
28
The NowSecure Action delivers fast, accurate, automated security analysis of iOS and Android apps coded in any language
Cppcheck Action
⭐
27
A github action to perform C/C++ security checks automatically
Ausera
⭐
24
AUSERA: Automated Security Vulnerability Detection for Android Apps
W4af
⭐
23
w4af: web advanced application attack and audit framework, the open source web vulnerability scanner.
Fsecurity
⭐
23
Security testing library written in F# to make writing security tests more fun.
Cpan Audit
⭐
23
Check CPAN modules for known security vulnerabilities
Erebus
⭐
23
Erebus is a fast tool for parameter-based vulnerability scanning using a Yaml based template engine like nuclei.
Pocassistdb
⭐
23
database of pocassist(漏洞库)
Actions Secrets
⭐
22
Adding this GitHub Action will scan your repository for sensitive data in your source code. We find things like passwords, server host strings, API keys, .env and config files and more
Infra Multi Account Region Startup Kit
⭐
21
Set up AWS infrastructure with terragrunt and terraform in multiple accounts and regions startup kit.
Labsecurity
⭐
21
Labsecurity is a tool that bundles ethical hacking python scripts into a single tool with cli interface.
Scanre
⭐
21
Static Code Analysis Toolkit for Vulnerability Detection and Mitigation
Actions Exposure
⭐
20
A GitHub Action that scans your public web applications after every deployment. Add this to your dev, staging and prod steps and SecureStack will make sure that what you've just deployed is secure and meets your requirements.
Ethre
⭐
20
Reverse Engineering tool for Ethereum EVM
Wazuh Chef
⭐
19
Wazuh - Chef cookbooks
Ge Sc
⭐
19
MANDO is a new heterogeneous graph representation to learn the heterogeneous contract graphs' structures to accurately detect vulnerabilities in smart contract source code at both coarse-grained contract-level and fine-grained line-level.
Pycpu
⭐
19
Central Processing Unit Information Gathering Tool
Browserrecon Php
⭐
19
Advanced Web Browser Fingerprinting
Orgasm
⭐
18
A tool for Oragnized ASM (Attack Surface Mapper). Subdomains enumeration, IPs scans, Vulnerability assesment...
Ir Fuzz
⭐
18
Rethinking Smart Contract Fuzzing: Fuzzing With Invocation Ordering and Important Branch Revisiting (TIFS 2022 Accepted).
Dr_checker_4_linux
⭐
18
Port of "DR.CHECKER : A Soundy Vulnerability Detection Tool for Linux Kernel Drivers" to Clang/LLVM 10 and Linux Kernel
Dynamit
⭐
17
Dynamit: Dynamic Vulnerability Detection of Ethereum Smart Contracts Using Machine Learning by @mojtaba-eshghie
Androshield
⭐
17
An ASP.NET web application that responsible of detecting and reporting vulnerabilities in android applications by static and dynamic analysis methodologies.
Episimmer
⭐
16
Episimmer is an Epidemic Simulation Framework for Decision Support. It is a highly flexible system that can be easily configured to help take decisions during an epidemic in closed communities like university campuses and gated communities.
Protocol Analyzer
⭐
16
Fuzz testing framework for network protocols.
Actions All In One
⭐
15
All of our GitHub Actions rolled into one. Or as we like to say: One GitHub Action to rule them all!
Pyraider
⭐
15
Using PyRaider You can scan installed dependencies known security vulnerabilities. It uses publicly known exploits, vulnerabilities database.
Whour
⭐
15
Tool for information gathering, IPReverse, AdminFInder, DNS, WHOIS, SQLi Scanner with google.
Gnn Regvd
⭐
14
Revisiting Graph Neural Networks for Vulnerability Detection (ICSE 2022) (Pytorch)
Pwnbert
⭐
14
A project based on Fine-tuned BERT to detect GLIBC vulnerabilities.
Mixewayscanner
⭐
13
Mixeway Scanner is Spring Boot application which aggregate integration with number of OpenSource Vulnerability scanners - both SAST and DAST types
Bytesafe Ce
⭐
13
Bytesafe Community Edition is a security platform that protects organizations from open source software supply chain attacks.
Nuclei Plugin
⭐
13
Nuclei is a fast tool for configurable targeted vulnerability scanning based on templates offering massive extensibility and ease of use.
Attacktoolkit
⭐
13
Open-source Exploiting Framework
Kubevuln
⭐
13
Kubevuln is an in-cluster component of the Kubescape security platform. It scans container images for vulnerabilities, using Grype as its engine.
Gptlens
⭐
13
Large Language Model-Powered Smart Contract Vulnerability Detection: New Perspectives (TPS23)
Regvuln
⭐
13
RegVuln is a tool that use Engine Trivy to generate reports about images Docker from Registry, have integration with Defect Dojo to Vulnerability Management.
T Xploiter
⭐
13
T-XPLOITER is a Perl program for detect and (even) exploit website(s). Why the name is T-XPLOITER ? T means Triple, XPLOITER means Exploiter. This program has 3 features and functions to detect and (even) exploit website(s), just check it out :).
Vivisection
⭐
12
Analysis Plugin and Tools for Vivisect
Cybersecurity Ethical Hacking
⭐
12
An ongoing collection of awesome ethical hacking tools, software, libraries, learning tutorials, frameworks, academic and practical resources
Kali Dockerized
⭐
11
Kali Linux in Docker + Ubuntu 22.04 in Docker for Bug Bounty, Penetration Testing, Security Research, Computer Forensics and Reverse Engineering. Kali Linux inside with Docker with or without support with systemd, repository also contains Proof of Concept with kind (Kubernetes in Docker) to test Kali Linux with enabled systemd in K8s cluster
Solgo
⭐
11
Solidity parser in Go, designed to transform Solidity code into a structured format for enhanced analysis, particularly beneficial for developers using Go to analyze Solidity smart contracts.
Actions Code
⭐
11
A GitHub Action for using SecureStack to analyse a repository codebase for vulnerabilities in library dependencies (software composition analysis).
Atomshields
⭐
11
Security testing framework for repositories and source code
Doublex
⭐
11
Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale
Openredscan
⭐
10
Multifunctional open redirection vulnerability scanner.
Smart Contracts Vulnerabilities
⭐
10
[BlockSys 2022] Exploring deep learning techniques for Ethereum smart contract vulnerability detection.
Wazuh Bosh
⭐
10
Wazuh - Release for Bosh.io
Pvulnz
⭐
10
Helper tool for PHP static code analysis
Basta Cosi
⭐
10
A framework for the detection of COSI vulnerabilities / XS-Leaks
Hackguard
⭐
10
FAST WEB APPLICATION VULNERABILITY SCANNER written in python3
Thexframework
⭐
10
Network/WebApplication Information Gathering, Enumeration and Vulnerability Scanning (Under Development)
Hoppr Cop
⭐
10
Hoppr Cop is a cli and python library that generates high quality vulnerability information from a cyclone-dx Software Bill of Materials (SBOM) by aggregating data from multiple vulnerability databases. This project is a mirror from gitlab
Smashing Smart Contracts Workshop
⭐
10
Dotnet Ossindex
⭐
10
A .NET Core global tool to check the packages for known vulnerabilities
Gemini Self Protector
⭐
10
Gemini - Runtime Application Self Protection Solution
Sif
⭐
10
🚀 blazing-fast pentesting suite written in Go
Log4shell Looker
⭐
10
log4jshell vulnerability scanner for bug bounty
Httprecon Win32
⭐
9
Advanced web server fingerprinting
Avmp
⭐
9
A collection of tools for managing and automating vulnerability management.
Fuzzy
⭐
9
A faster version of AFL-Fuzz used for DARPA Cyber Grand Challenge with optimized scheduler code
Dependabot Scraper
⭐
9
Python / Github CLI - Github dependabot alert scraper - Software Composition Analysis (SCA), Vulnerability Management, Patching, Supply Chain Security
Tokenauditor
⭐
9
[QRS'22] TokenAuditor: Detecting Manipulation Risk in Token Smart Contract by Fuzzing
Function_representation_learning
⭐
8
Vulnerability Discovery with Function Representation Learning from Unlabeled Projects
Pluto
⭐
8
一款集成了几十G工具的透测试系统-冥王星
Trovon
⭐
8
Learning from what we know: How to perform vulnerability prediction using noisy historical data, Empirical Software Engineering (EMSE)
Web Application Vulnerability Scanner And Threat Analyzer
⭐
8
Research based Hybrid Scanner to detect various SQL, JavaScript and XSS vulnerabilities
Cvedetect
⭐
7
Yet another Vulnerability Assessment Tool for efficient CVE detection.
Sql Dex
⭐
7
Sql injection vulnerability scanner
101-200 of 223 search results
< Previous
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.