#other #awesome #awesome_list #awesome_lists #bugbounty #dns #domain #exploit #hacking #hacking_tools #osint #osint_tool #redteam #redteaming #search_engine #security #security_tools #url #vulnerabilities #vulnerability #wifi_network
https://github.com/edoardottt/awesome-hacker-search-engines
https://github.com/edoardottt/awesome-hacker-search-engines
GitHub
GitHub - edoardottt/awesome-hacker-search-engines: A curated list of awesome search engines useful during Penetration testing,…
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more - edoardottt/awesome-hacker-search-engines
#html #analytics #appsec #automation #devsecops #django #hacktoberfest #kubernetes #owasp #python #security #security_automation #security_orchestration #vulnerability_correlation #vulnerability_databases #vulnerability_management
https://github.com/DefectDojo/django-DefectDojo
https://github.com/DefectDojo/django-DefectDojo
GitHub
GitHub - DefectDojo/django-DefectDojo: Open-Source Unified Vulnerability Management, DevSecOps & ASPM
Open-Source Unified Vulnerability Management, DevSecOps & ASPM - DefectDojo/django-DefectDojo
#other #azure #blueteam #cybersecurity #defender_for_endpoint #dfir #infosec #kql #mde #mdi #security #sentinel #threat_hunting #vulnerability_management #zero_day
https://github.com/Bert-JanP/Hunting-Queries-Detection-Rules
https://github.com/Bert-JanP/Hunting-Queries-Detection-Rules
GitHub
GitHub - Bert-JanP/Hunting-Queries-Detection-Rules: KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection…
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rul...
#go #cloud_native #golang #kubernetes #misconfiguration #octoberfest #operator #security #security_tools #vulnerability_detection #vulnerability_scanners
https://github.com/aquasecurity/trivy-operator
https://github.com/aquasecurity/trivy-operator
GitHub
GitHub - aquasecurity/trivy-operator: Kubernetes-native security toolkit
Kubernetes-native security toolkit. Contribute to aquasecurity/trivy-operator development by creating an account on GitHub.
#open_policy_agent #appsec #cloudnative #devsecops #golang #hacktoberfest #iac #infrastructure_as_code #open_policy_agent #security #security_tools #vulnerability_detection #vulnerability_scanners
https://github.com/Checkmarx/kics
https://github.com/Checkmarx/kics
GitHub
GitHub - Checkmarx/kics: Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development…
Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code with KICS by Checkmarx. - Checkmarx/kics
#python #bugbounty #cybersecurity #hacking #nuclei #penetration_testing #pentesting #reconnaissance #security #security_tools #vulnerability_scanners #web #webapplication #webappsecurity
https://github.com/gotr00t0day/Gsec
https://github.com/gotr00t0day/Gsec
GitHub
GitHub - gotr00t0day/Gsec: Web Security Scanner
Web Security Scanner. Contribute to gotr00t0day/Gsec development by creating an account on GitHub.
#rust #c #foo #greenbone #greenbone_community_edition #greenbone_vulnerability_management #gvm #openvas #openvas_scanner #scanner #techops #vulnerability #vulnerability_assessment #vulnerability_detection #vulnerability_management #vulnerability_scanners
https://github.com/greenbone/openvas-scanner
https://github.com/greenbone/openvas-scanner
GitHub
GitHub - greenbone/openvas-scanner: This repository contains the scanner component for Greenbone Community Edition.
This repository contains the scanner component for Greenbone Community Edition. - greenbone/openvas-scanner
#go #containers #devsecops #docker #go #golang #hacktoberfest #iac #infrastructure_as_code #kubernetes #misconfiguration #security #security_tools #vulnerability #vulnerability_detection #vulnerability_scanners
Trivy is a powerful tool that helps you find security issues in various places like container images, filesystems, Git repositories, and more. It checks for vulnerabilities, misconfigurations, sensitive information, and software licenses. Trivy supports many programming languages and platforms, making it very versatile. You can easily install it using methods like `brew install trivy` or `docker run aquasec/trivy`. It also integrates with popular tools like GitHub Actions and Kubernetes. Using Trivy helps you secure your projects by identifying potential security problems early, which is very beneficial for keeping your software safe and reliable.
https://github.com/aquasecurity/trivy
Trivy is a powerful tool that helps you find security issues in various places like container images, filesystems, Git repositories, and more. It checks for vulnerabilities, misconfigurations, sensitive information, and software licenses. Trivy supports many programming languages and platforms, making it very versatile. You can easily install it using methods like `brew install trivy` or `docker run aquasec/trivy`. It also integrates with popular tools like GitHub Actions and Kubernetes. Using Trivy helps you secure your projects by identifying potential security problems early, which is very beneficial for keeping your software safe and reliable.
https://github.com/aquasecurity/trivy
GitHub
GitHub - aquasecurity/trivy: Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories…
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more - aquasecurity/trivy
#python #ai #llm_evaluation #llm_security #security_scanners #vulnerability_assessment
`garak` is a free tool that helps check if large language models (LLMs) have weaknesses or can be made to fail in unwanted ways. It tests for issues like hallucinations, data leaks, prompt injections, misinformation, and more. You can use it like `nmap` but for LLMs. To use `garak`, you install it with `pip` and specify the LLM model you want to test. It runs various probes to see if the model behaves incorrectly and gives you detailed reports on any vulnerabilities found. This helps ensure your LLMs are safe and reliable. You can get started by following the user guide and joining their Discord community for support.
https://github.com/NVIDIA/garak
`garak` is a free tool that helps check if large language models (LLMs) have weaknesses or can be made to fail in unwanted ways. It tests for issues like hallucinations, data leaks, prompt injections, misinformation, and more. You can use it like `nmap` but for LLMs. To use `garak`, you install it with `pip` and specify the LLM model you want to test. It runs various probes to see if the model behaves incorrectly and gives you detailed reports on any vulnerabilities found. This helps ensure your LLMs are safe and reliable. You can get started by following the user guide and joining their Discord community for support.
https://github.com/NVIDIA/garak
GitHub
GitHub - NVIDIA/garak: the LLM vulnerability scanner
the LLM vulnerability scanner. Contribute to NVIDIA/garak development by creating an account on GitHub.
#go #afrog #bug_bounty #penetration_testing #pentest #poc #red_teaming #vulnerability_scanner #vulnerability_scanning_tools
Afrog is a powerful tool for security professionals, especially those involved in bug bounty, penetration testing, and red teaming. It is a high-performance vulnerability scanner that is fast, stable, and has low false positives. Afrog supports user-defined Proof of Concepts (PoCs) and comes with various built-in types like CVE, CNVD, default passwords, and more. It generates detailed HTML vulnerability reports and allows customizable and updatable PoCs.
Using afrog, you can quickly scan websites for vulnerabilities, create HTML reports, and even store results in a database for easy access via a web interface. The tool is open-source, has an active community, and can be installed using Go or by downloading binaries from GitHub.
Overall, afrog enhances your security defense capabilities by providing a robust and efficient way to identify and remediate vulnerabilities.
https://github.com/zan8in/afrog
Afrog is a powerful tool for security professionals, especially those involved in bug bounty, penetration testing, and red teaming. It is a high-performance vulnerability scanner that is fast, stable, and has low false positives. Afrog supports user-defined Proof of Concepts (PoCs) and comes with various built-in types like CVE, CNVD, default passwords, and more. It generates detailed HTML vulnerability reports and allows customizable and updatable PoCs.
Using afrog, you can quickly scan websites for vulnerabilities, create HTML reports, and even store results in a database for easy access via a web interface. The tool is open-source, has an active community, and can be installed using Go or by downloading binaries from GitHub.
Overall, afrog enhances your security defense capabilities by providing a robust and efficient way to identify and remediate vulnerabilities.
https://github.com/zan8in/afrog
GitHub
GitHub - zan8in/afrog: A Security Tool for Bug Bounty, Pentest and Red Teaming.
A Security Tool for Bug Bounty, Pentest and Red Teaming. - zan8in/afrog
#javascript #bugbounty #exploit_development #exploits #fingerprint #hacktoberfest #nuclei #nuclei_checks #nuclei_templates #security #vulnerability_detection
Nuclei Templates are pre-made scripts used by the Nuclei scanner to find security vulnerabilities in applications. These templates are created and shared by a community of users, making it easier for everyone to identify and fix security issues. You can contribute your own templates, report bugs, or request new features, which helps grow the library of available templates. This community-driven approach ensures that the scanner stays updated and effective, benefiting users by providing a robust tool for enhancing application security. You can also join discussions on GitHub or the Discord community to learn more and share ideas.
https://github.com/projectdiscovery/nuclei-templates
Nuclei Templates are pre-made scripts used by the Nuclei scanner to find security vulnerabilities in applications. These templates are created and shared by a community of users, making it easier for everyone to identify and fix security issues. You can contribute your own templates, report bugs, or request new features, which helps grow the library of available templates. This community-driven approach ensures that the scanner stays updated and effective, benefiting users by providing a robust tool for enhancing application security. You can also join discussions on GitHub or the Discord community to learn more and share ideas.
https://github.com/projectdiscovery/nuclei-templates
GitHub
GitHub - projectdiscovery/nuclei-templates: Community curated list of templates for the nuclei engine to find security vulnerabilities.
Community curated list of templates for the nuclei engine to find security vulnerabilities. - projectdiscovery/nuclei-templates