asleep_scanner
detectify-cves
asleep_scanner | detectify-cves | |
---|---|---|
1 | 1 | |
58 | 20 | |
- | - | |
0.0 | 1.5 | |
about 2 years ago | about 1 year ago | |
Python | Python | |
Apache License 2.0 | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
asleep_scanner
detectify-cves
What are some alternatives?
dirsearch - Web path scanner
Jira-Lens - Fast and customizable vulnerability scanner For JIRA written in Python
evillimiter - Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
webstor - WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted servers via zone transfer data - stores their responses, and lets you query for known web technologies, including those with zero-day vulnerabilities.
ShellShockHunter - It's a simple tool for test vulnerability shellshock
SBSCAN - SBSCAN是一款专注于spring框架的渗透测试工具,可以对指定站点进行springboot未授权扫描/敏感信息扫描以及进行spring框架漏洞扫描与验证的综合利用工具。 [SBSCAN is a penetration testing tool focused on the spring framework that can scan springboot sensitive information/unauthorized for specified sites and scan and validate spring related vulnerabilities]
Vulnnr - Vulnnr - Vulnerability Scanner And Mass Exploiter, created for pentesting.
embark - EMBArk - The firmware security scanning environment
reconspider - 🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.
malicious-pdf - 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
bbot - A recursive internet scanner for hackers.
inthewilddb - Hourly updated database of exploit and exploitation reports