An open API service indexing awesome lists of open source software.

Projects in Awesome Lists tagged with vulnerability-identification

A curated list of projects in awesome lists tagged with vulnerability-identification .

https://github.com/aboutcode-org/vulnerablecode

A free and open vulnerabilities database and the packages they impact. And the tools to aggregate and correlate these vulnerabilities. Sponsored by NLnet https://nlnet.nl/project/vulnerabilitydatabase/ for https://www.aboutcode.org/ Chat at https://gitter.im/aboutcode-org/vulnerablecode Docs at https://vulnerablecode.readthedocs.org/

cpe cve cvss nvd ossindex osv package-url purl security security-tools snyk vulndb vulnerability vulnerability-database vulnerability-databases vulnerability-detection vulnerability-identification vulnerability-scanners

Last synced: 14 May 2025

https://github.com/nullarray/mida-multitool

Bash script purposed for system enumeration, vulnerability identification and privilege escalation.

bash bash-script enumeration exploit exploitation pentest pentesting privilege-escalation root shell shell-script vulnerability-identification

Last synced: 21 Aug 2025

https://github.com/NullArray/MIDA-Multitool

Bash script purposed for system enumeration, vulnerability identification and privilege escalation.

bash bash-script enumeration exploit exploitation pentest pentesting privilege-escalation root shell shell-script vulnerability-identification

Last synced: 11 Aug 2025

https://github.com/Patrowl/PatrowlHearsData

Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds

cpe cve cve-scanning cwe exploit vulnerabilities vulnerability-identification

Last synced: 28 Sep 2025

https://github.com/olbat/nvdcve

NVD/CVE as JSON files

cve vulnerability-identification

Last synced: 05 Apr 2025

https://github.com/nmilcoff/BreachDetector

Detect root, emulation, debug mode and other security concerns in your Xamarin apps

debug detection emulation mobile owasp root security vulnerability-identification xamarin

Last synced: 13 May 2025

https://github.com/nmilcoff/breachdetector

Detect root, emulation, debug mode and other security concerns in your Xamarin apps

debug detection emulation mobile owasp root security vulnerability-identification xamarin

Last synced: 09 Apr 2025

https://github.com/paulveillard/cybersecurity-blue-team

A collection of awesome software, libraries, learning tutorials, documents and books, technical resources and cool stuff about Blue Team in Cybersecurity.

blue blue-team cyber-threat-intelligence cybernetics cybersecurity vulnerabilities vulnerability-identification vulnerability-management vulnerability-research vulnerability-scanners vulnerability-scanning

Last synced: 06 Jan 2026

https://github.com/paulveillard/cybersecurity-security-harderning

A collection of awesome security hardening software, libraries, learning tutorials & documents, e-books, best practices, checklists, benchmarks about hardening in Cybersecurity

ami linux-hardening os-hardening security security-audit security-hacks security-hardening ubuntu-hardening ubuntu-sec-tools vulnerability vulnerability-assessment vulnerability-detection vulnerability-identification vulnerability-scanning windows-hardening

Last synced: 07 Jul 2025

https://github.com/krishpranav/wpscan

wpscan is a vulnerability recognition tool in CMS Wordpress developed in Go.

cms-wordpress enumeration go golang recon vulnerability vulnerability-identification vulnerability-scanners wordpress

Last synced: 29 Jun 2025

https://github.com/paulveillard/cybersecurity-dynamic-analysis

An ongoing & curated collection of awesome vulnerability scanning software, libraries and frameworks, best guidelines and technical resources and most important dynamic application security testing (DAST)

dast dynamic-analysis dynamic-analysis-engines sast static-analysis vulnerabilities vulnerability-assessment vulnerability-identification vulnerability-management vulnerability-scanner vulnerability-scanners

Last synced: 06 Jan 2026

https://github.com/csaf-tools/cvrf-csaf-converter

A CVRF CSAF Converter, taking care about OASIS specification.

csaf cvrf cvrf-csaf-converter oasis vulnerability-assessment vulnerability-identification

Last synced: 04 Sep 2025

https://github.com/xorsirenz/bevip

Bash Enumeration Vulnerability Identification Privilege Escalation Toolkit

bash enumeration privilege-escalation root shell shell-script toolkit vulnerability-identification

Last synced: 28 Mar 2025

https://github.com/password123456/cves

High-risk CVEs that may require verification and impact analysis.

cve-scanning cve-search cves vulnerability-database-entry vulnerability-identification

Last synced: 21 Feb 2025

https://github.com/ayeshaashfaq12/vulnerability_scanner

The Vulnerability Scanner is a Django-based application that scans websites for security vulnerabilities, providing insights into potential weaknesses such as SQL Injection, XSS, and CSRF issues. Users receive a detailed analysis and site safety score, helping them enhance their web security posture.

cross-site-scripting django django-application django-project javascript-injection python python-app python-script remote-code-execution sql-injection-attacks vulnerability vulnerability-analysis vulnerability-assessment vulnerability-detection vulnerability-identification vulnerability-scanner vulnerability-scanners vulnerability-scanning

Last synced: 18 Mar 2025

https://github.com/password123456/nvd-cve-database

The Common Vulnerabilities Exposures (CVE) Database

cve nvd vulnerability-databases vulnerability-identification

Last synced: 21 Feb 2025

https://github.com/hangyeol012/scanly

Scanly is a media file organizer that monitors directories for new files and creates an organized library using symbolic links.

android camera datamatrix django exploit face-detection java port-scanner scanner scanning vulnerability vulnerability-assessment vulnerability-identification zxing

Last synced: 13 Aug 2025

https://github.com/eccentrix-ca/sql-injection-attack-understanding-the-threat-in-cybersecurity

This article aims to demystify SQL Injection, explaining what it is, how it operates, its purposes in the cybersecurity landscape, and mentioning tools that can be used to conduct such attacks.

cyberattack sqlinjection vulnerability-identification web-vulnerabilities

Last synced: 29 Nov 2025