There are 14 repositories under vulnerability-scanning topic.
Advanced vulnerability scanning with Nmap NSE
A fast tool to scan CRLF vulnerability written in Go
60k+ WordPress Nuclei templates, updated daily from Wordfence intel—filter by severity/tags/CVE and scan in one line. 🚀🔒
Work in progress...
Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
vulscan 扫描系统:最新的poc&exp漏洞扫描,redis未授权、敏感文件、java反序列化、tomcat命令执行及各种未授权扫描等...
OWASP VulnerableApp Project: For Security Enthusiasts by Security Enthusiasts.
A compilation of resources in the software supply chain security domain, with emphasis on open source
A PHP dependency vulnerabilities scanner based on the Security Advisories Database.
Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration
Greenbone Vulnerability Management Docker Image with OpenVAS
Nmap script that scans for probable vulnerabilities based on services discovered in open ports.
PatrowlHears - Vulnerability Intelligence Center / Exploits
A VS Code Extension for Trivy
Mixeway is security orchestrator for vulnerability scanners which enable easy plug in integration with CICD pipelines. MixewayHub project contain one click docker-compose file which configure and run images from docker hub.
| FazScan is a Perl program to do some vulnerability scanning and pentesting |
You guessed well, genius !! This tool is intended for the initiation to ethical hacking with python
PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.
Performing website vulnerability scanning using OpenAI technologie
Advanced Reconnaissance tool to enumerate attacking surface of the target.
SiftScan 是一个集成资产识别、资产梳理、资产收集、弱点检测、漏洞检测等的工具。它致力于提高红蓝对抗/脆弱性赏金的效率。is a tool that integrates asset identification, asset sorting, asset collection, vulnerability detection, vulnerability detection, etc. It is committed to improving the efficiency of the red-blue confrontation/vulnerability bounty.
Faraday's Command Line Interface
A collection of awesome software, libraries, learning tutorials, documents and books, technical resources and cool stuff about Blue Team in Cybersecurity.
Search for known vulnerabilities in software using software titles or a CPE 2.3 string
A collection of awesome security hardening software, libraries, learning tutorials & documents, e-books, best practices, checklists, benchmarks about hardening in Cybersecurity
COLI (Command Orchestration & Logic Interface) – A visual orchestration layer for EWE, built for bug bounty automation. Create and run CLI workflows visually, manage scopes, monitor scans in real-time, and chain tools like subfinder → httpx → nuclei in a single streamlined interface.
A Beat that monitors a local Nessus reports directory and outputs scan results to Elasticsearch or Logstash.
A GitHub Action that scans your public web applications after every deployment. Add this to your dev, staging and prod steps and SecureStack will make sure that what you've just deployed is secure and meets your requirements.
Barcha is your Swiss‑Army knife for SQL Injection reconnaissance 🔍. Written in Go, it automates: Shodan enumeration of SSL hosts 🕵️♂️ Liveness & redirect checks (ignores bad certs) 🔄 Automated Ghauri tests for each host 🛡️ SQLite logging of every scan 🔖
An AI-powered web application vulnerability scanner that automates the detection of common security flaws and provides AI-driven insights for impact assessment and remediation suggestions.
Automate Nuclei scans and streamline bug hunting workflows