Hourly updated database of exploit and exploitation reports
-
Updated
Jun 11, 2024 - Python
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
Hourly updated database of exploit and exploitation reports
HackerOne "in scope" domains
Provides public bug bounty programs in-scope data that offer rewards and monitors public bug bounty programs assets.
A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and control, hunt for advanced threats, collaborate with the community, and write detections-as-code.
A Ruby micro-framework for writing and running exploits
PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.
Prowler is an Open Source Security tool for AWS, Azure, GCP and Kubernetes to do security assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. Includes CIS, NIST 800, NIST CSF, CISA, FedRAMP, PCI-DSS, GDPR, HIPAA, FFIEC, SOC2, GXP, Well-Architected Security, ENS and more
Asset inventory of over 800 public bug bounty programs.
My Privacy DNS #Matrix lists for blacklisting
Athena OS is a Arch/Nix-based distro focused on Cybersecurity. Learn, practice and enjoy with any hacking tool!
Infection Monkey - An open-source adversary emulation platform
Integrate static security testing with HCL AppScan on Cloud using GitHub Actions
🛡️ The missing GraphQL security security layer for Apollo GraphQL and Yoga / Envelop servers 🛡️
The CVE Binary Tool helps you determine if your system includes known vulnerabilities. You can scan binaries for over 200 common, vulnerable components (openssl, libpng, libxml2, expat and others), or if you know the components used, you can get a list of known vulnerabilities associated with an SBOM or a list of components and versions.
Ingesting, pipelining, and enhancing your DNS logs with usage indicators, security analysis, and additional metadata.
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
Open source vulnerability DB and triage service.
🧰 A zero trust swiss army knife for working with X509, OAuth, JWT, OATH OTP, etc.
Find and verify secrets