Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for vulnerability scanning
vulnerability-scanning
x
37 search results found
Vulscan
⭐
2,983
Advanced vulnerability scanning with Nmap NSE
Gscan
⭐
2,497
本程序旨在为安全应急响应人员对Linux主机排查时提供便利,实现主机侧Checklist的自动全面化
Crlfuzz
⭐
1,155
A fast tool to scan CRLF vulnerability written in Go
Jackhammer
⭐
599
Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
Vulscan
⭐
382
vulscan 扫描系统:最新的poc&exp漏洞扫描,redis未授权、敏感文件、java反序列化、tomcat命
Security Checker
⭐
282
A PHP dependency vulnerabilities scanner based on the Security Advisories Database.
Salt Scanner
⭐
255
Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration
Mageni
⭐
251
Open-source vulnerability scanner
Gvm Docker
⭐
243
Greenbone Vulnerability Management Docker Image with OpenVAS
Vulnerableapp
⭐
236
OWASP VulnerableApp Project: For Security Enthusiasts by Security Enthusiasts.
Awesome Software Supply Chain Security
⭐
165
A compilation of resources in the software supply chain security domain, with emphasis on open source
Patrowlhears
⭐
150
PatrowlHears - Vulnerability Intelligence Center / Exploits
Mixewayhub
⭐
92
Mixeway is security orchestrator for vulnerability scanners which enable easy plug in integration with CICD pipelines. MixewayHub project contain one click docker-compose file which configure and run images from docker hub.
Trivy Vscode Extension
⭐
89
A VS Code Extension for Trivy
Fazscan
⭐
74
| FazScan is a Perl program to do some vulnerability scanning and pentesting |
Cvescannerv2
⭐
66
Nmap script that scans for probable vulnerabilities based on services discovered in open ports.
Phaser
⭐
53
Automated attack surface mapper and vulnerability scanner (Work In Progress 🚧)
Vulnscan
⭐
34
Performing website vulnerability scanning using OpenAI technologie
Ci Tools
⭐
34
Contains scripts for running anchore engine in CI pipelines
Faraday Cli
⭐
30
Faraday's Command Line Interface
Pwn
⭐
28
PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.
Nessusbeat
⭐
26
A Beat that monitors a local Nessus reports directory and outputs scan results to Elasticsearch or Logstash.
Actions Exposure
⭐
20
A GitHub Action that scans your public web applications after every deployment. Add this to your dev, staging and prod steps and SecureStack will make sure that what you've just deployed is secure and meets your requirements.
Nessus2es
⭐
17
Send your nessus compliance and vulnerability scan data to ElasticSearch
Siftscan
⭐
17
SiftScan 是一个集成资产识别、资产梳理、资产收集、弱点检测、漏洞检测等的工具。它致力于提高红蓝对抗/脆弱性赏金 a tool that integrates asset identification, asset sorting, asset collection, vulnerability detection, vulnerability detection, etc. It is committed to improving the efficiency of the red-blue confrontation/vulnerability bounty.
Actions All In One
⭐
15
All of our GitHub Actions rolled into one. Or as we like to say: One GitHub Action to rule them all!
Recon X
⭐
13
Advanced Reconnaissance tool to enumerate attacking surface of the target.
Regvuln
⭐
13
RegVuln is a tool that use Engine Trivy to generate reports about images Docker from Registry, have integration with Defect Dojo to Vulnerability Management.
Vivisection
⭐
12
Analysis Plugin and Tools for Vivisect
Mixewaybackend
⭐
12
Mixeway is security orchestrator for vulnerability scanners which enable easy plug in integration with CICD pipelines. MixewayBackend project contains source code of backend with all plugin integrations writer in Spring Boot.
Avmp
⭐
9
A collection of tools for managing and automating vulnerability management.
Cybersecurity Blue Team
⭐
9
A collection of awesome software, libraries, learning tutorials, documents and books, technical resources and cool stuff about Blue Team in Cybersecurity.
Vulnerability Management Resources
⭐
8
A collection of resources related to vulnerability management.
Jitterbug
⭐
7
JitterBug passively searches for Basic Info, open ports, potential CVE's on the given Target IP in third party databases without Direct interaction with the target
Auditr
⭐
6
A utility for auditing C code for vulnerabilities.
Hacking With Python
⭐
6
You guessed well, genius !! This tool is intended for the initiation to ethical hacking with python
Portranger
⭐
5
Converts an unordered (e.g. grepped) network ports to a condensed range/list that is suitable for nmap and other tools.
1-37 of 37 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.