#Awesome#This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artif...
翻译 - 该存储库主要由Omar Santos维护,并包含与道德黑客/渗透测试,数字取证和事件响应(DFIR),漏洞研究,漏洞利用开发,逆向工程等相关的数千种资源。
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
翻译 - 适用于Linux,FreeBSD,容器映像,运行容器,WordPress,编程语言库,网络设备的无代理漏洞扫描程序
Open Source Vulnerability Management Platform
翻译 - 协同渗透测试和漏洞管理平台
Open Source Cloud Native Application Protection Platform (CNAPP)
翻译 - 识别运行容器、图像、主机和存储库中的漏洞
DevSecOps, ASPM, Vulnerability Management. All on one platform.
翻译 - DefectDojo是一个开源应用程序漏洞关联和安全协调工具。
Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management
翻译 - 自动化渗透测试框架
This repository contains the scanner component for Greenbone Community Edition.
翻译 - 开放式漏洞评估扫描仪-Greenbone漏洞管理(GVM)扫描仪
面向IT、安全和基础架构团队的开源平台。(Linux、macOS、Chrome、Windows、云、数据中心)
Tools and Techniques for Blue Team / Incident Response
ASOC, ASPM, DevSecOps, Vulnerability Management Using ArcherySec.
翻译 - 集中DevSecOps团队的漏洞评估和管理
🆕 The Multi-Tool Web Vulnerability Scanner.
Open source vulnerability DB and triage service.
翻译 - 开源漏洞数据库和分类服务。
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
GUAC aggregates software security metadata into a high fidelity graph database.
🧵 CLI tool for directly patching container images!
Open source templates you can use to bootstrap your security programs
Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
Easy automated vulnerability scanning, reporting and analysis
PatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform
Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time threat information, gain a competitive advantage, and stay informed...