#
vulnerability-detection
Here are 307 public repositories matching this topic...
good first issue
Denotes an issue ready for a new contributor, according to the "help wanted" guidelines.
kind/feature
Categorizes issue or PR as related to a new feature.
target/kubernetes
Issues relating to kubernetes cluster scanning
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
linux
shell
auditing
devops
unix
security-audit
pci-dss
compliance
hardening
security-vulnerability
security-hardening
devops-tools
hipaa
vulnerability-detection
vulnerability-scanners
security-scanner
vulnerability-assessment
gdpr
security-tools
system-hardening
-
Updated
Jul 20, 2022 - Shell
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
go
linux
golang
freebsd
security
security-audit
administrator
cybersecurity
security-vulnerability
vulnerabilities
security-hardening
vulnerability-detection
vulnerability-management
vulnerability-scanners
security-scanner
vulnerability-assessment
vuls
security-automation
security-tools
vulnerability-scanner
-
Updated
Aug 1, 2022 - Go
Fast and customizable vulnerability scanner based on simple YAML based DSL.
security
vulnerability-detection
security-scanner
vulnerability-assessment
vulnerability-scanner
attack-surface
subdomain-takeover
cve-scanner
nuclei-engine
-
Updated
Aug 2, 2022 - Go
Kubescape is a K8s open-source tool providing a multi-cloud K8s single pane of glass, including risk analysis, security compliance, RBAC visualizer and image vulnerabilities scanning.
-
Updated
Aug 1, 2022 - Go
Community curated list of templates for the nuclei engine to find security vulnerabilities.
security
fingerprint
exploits
nuclei
bugbounty
vulnerability-detection
exploit-development
nuclei-templates
nuclei-checks
-
Updated
Aug 2, 2022
Wazuh - The Open Source Security Platform
security
elasticsearch
log-analysis
monitoring
incident-response
ids
intrusion-detection
pci-dss
compliance
security-hardening
loganalyzer
vulnerability-detection
ossec
openscap
wazuh
policy-monitoring
security-awareness
file-integrity-management
-
Updated
Aug 2, 2022 - C
OWASP dependency-check is a software composition analysis utility that detects publicly disclosed vulnerabilities in application dependencies.
security
security-audit
maven-plugin
jenkins-plugin
gradle-plugin
build-tool
ant-task
vulnerability-detection
software-composition-analysis
-
Updated
Aug 1, 2022 - Java
巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
security
security-audit
scanner
exploits
infosec
pentesting
vulnerability-detection
vulnerability-scanners
vulnerability-assessment
-
Updated
Mar 16, 2021 - Python
Web Application Security Scanner Framework
javascript
ruby
crawler
security-audit
modular
hack
dom
analysis
scanner
detection
hacking
xss
audit
web-application
penetration-testing
sql-injection
vulnerability-detection
arachni
scanners
-
Updated
May 29, 2022 - Ruby
Advanced vulnerability scanning with Nmap NSE
security
security-audit
lua
exploit
lua-script
nmap
penetration-testing
vulnerability
vulnerability-databases
vulnerability-detection
nse
vulnerability-identification
vulnerability-scanners
security-scanner
vulnerability-assessment
nmap-scripts
nsescript
nmap-scan-script
vulnerability-scanning
vulnerability-database-entry
-
Updated
Mar 11, 2022 - Lua
Vulnerabilities Scan: 15000+PoCs; 20 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty...
ssh
golang
tools
attack
nmap
brute-force
recon
nuclei
auto
bugbounty
vulnerability-detection
hacker
vulnerability-scanners
security-scanner
0day
security-tools
pentest-tool
hacktools
bugbounty-tools
vulnerabilities-scan
-
Updated
Aug 2, 2022 - Go
cve-search - a tool to perform local searches for known vulnerabilities
vulnerabilities
cve
cpe
vulnerability-detection
cve-scanning
vulnerability-assessment
common-vulnerabilities
cve-search
cve-databases
cve-entries
-
Updated
Jul 27, 2022 - Python
serverless
secops
cloud-native
security-vulnerability
vulnerability-detection
vulnerability-management
observability
vulnerability-scanners
vulnerability-assessment
log4j2
threat-analysis
security-tools
cloudsecurity
devsecops
vulnerability-scanning
scanning-tool
registry-scanning
cwpp
-
Updated
Aug 2, 2022 - JavaScript
This repository contains the scanner component for Greenbone Community Edition.
scanner
vulnerability
openvas
vulnerability-detection
vulnerability-management
vulnerability-scanners
vulnerability-assessment
gvm
greenbone
greenbone-vulnerability-management
openvas-scanner
-
Updated
Aug 1, 2022 - C
The Offensive Manual Web Application Penetration Testing Framework.
osint
enumeration
highlight
scanning
exploitation
vulnerability-detection
web-penetration-testing
intelligence-gathering
web-application-security
comprehensive-web
reconnaissance
footprinting
vulnerability-analysis
comprehensive
web-fuzzer
scanning-enumeration
tidos-framework
-
Updated
Feb 12, 2021 - Python
vulnx 🕷️ an intelligent Bot, Shell can achieve automatic injection, and help researchers detect security vulnerabilities CMS system. It can perform a quick CMS security detection, information collection (including sub-domain name, ip address, country information, organizational information and time zone, etc.) and vulnerability scanning.
bot
crawler
hacking
exploits
vulnerability
pentest
vulnerability-detection
vulnerability-assessment
information-gathering
security-tools
cms-detector
cloudflare-detection
shell-injection
vulnerability-exploit
website-vulnerability-scanner
wp-scanner
auto-exploiter
dorks
detects-vulnerabilities
subdomains-gathering
-
Updated
Jun 10, 2022 - Python
Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the active and passive scanner by means of personalized rules through a very intuitive graphical interface.
-
Updated
May 10, 2022 - BlitzBasic
Safety checks Python dependencies for known security vulnerabilities and suggests the proper remediations for vulnerabilities detected.
-
Updated
Jul 26, 2022 - Python
halaharr
commented
Jul 20, 2022
The enhancement may already be reported! Please search for the enhancement before creating one.
Current Behavior:
Currently when you download the SBOM from Home->Projects->->Components tab dependencies are not included.
Proposed Behavior:
Please include dependence when downloading the SBOM. Thanks
scanner
enumeration
penetration-testing
vulnerabilities
kali-linux
vulnerability-detection
offensive-security
vulnerability-management
vulnerability-scanners
security-scanner
vulnerability-assessment
web-vulnerabilities-scanner
security-tools
oscp
reconnaissance
vulnerability-scanner
penetration-testing-framework
kali-scripts
scanner-web
security-scanning
-
Updated
Mar 31, 2022 - Python
X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
wordpress
video
drupal
exploit
scanner
hacking
joomla
prestashop
pentest
exploitation
vulnerability-detection
hacking-tool
security-scanner
vulnerability-assessment
lokomedia
security-tools
vulnerability-scanner
vulnerability-exploit
website-vulnerability-scanner
wp-scanner
auto-exploiter
-
Updated
Apr 16, 2022 - Perl
For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️ ⚔️ 🧙
security
infosec
pentesting
bugbounty
xss-detection
vulnerability-detection
pentest-tool
vulnerability-research
bugbountytips
-
Updated
May 10, 2022
grep rough audit - source code auditing tool
-
Updated
Apr 11, 2022 - Shell
红队综合渗透框架
-
Updated
Jul 6, 2022 - Python
Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read
linux
iot
embedded
kernel
paper
linux-kernel
fuzzing
exploitation
vulnerability-detection
mitigations
rca
sanitizer
directed-fuzzing
hybrid-fuzzing
fuzzing-binaries
guided-fuzzing
root-cause
-
Updated
Jun 28, 2022
The Correlated CVE Vulnerability And Threat Intelligence Database API
python
threat
exploits
vulnerability
scap
vulnerability-databases
threatintel
cve
oval
vulnerability-detection
vulnerability-identification
vulnerability-scanners
cwe
capec
intelligence-gathering
threat-intelligence
vulnerability-database-entry
threat-intelligence-database
vfeed
common-vulnerability-exposure
-
Updated
May 28, 2021 - Python
Easy automated vulnerability scanning, reporting and analysis
security
analysis
ssllabs
nmap
medusa
filters
nessus
vulnerability-detection
seccubus
repeated-scans
nikto
vulnerability-management
testssl
-
Updated
Jan 10, 2020 - JavaScript
Open Source Security Guide
security
best-practices
owasp
cybersecurity
penetration-testing
compliance
vulnerabilities
security-hardening
vulnerability-detection
cve-scanning
vulnerability-scanners
security-automation
security-tools
privacy-protection
redteam
pentesting-tools
blueteaming
kubernetes-security
digital-forensic-readiness
awesome-security
-
Updated
Jul 25, 2022 - Go
Vulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
ruby
rails
security
security-audit
network
scanner
hacking
nmap
cve
network-analysis
vulnerability-detection
cve-scanning
hacking-tool
vulnerability-scanners
vulnerability-assessment
security-tools
-
Updated
Jul 26, 2022 - Ruby
Improve this page
Add a description, image, and links to the vulnerability-detection topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the vulnerability-detection topic, visit your repo's landing page and select "manage topics."
Description
When you run the
trivy k8s
command, there is no option to specify an alternativekubeconfig
file path.By default, the kubeconfig file resides in
$HOME/.kube/config
.However, users of Kubernetes often need to specify a different path, using a parameter like
--kubeconfig
on thekubectl
command.If you don't have the kubeconfig in the default filesystem path, then