Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework
-
Updated
Jun 7, 2024 - HTML
Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework
PatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform
A Web Vulnerability Scanner and Patcher
PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform
Blockchain Attack Vectors & Vulnerabilities to Smart Contracts
In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we can get partial private key values and restore a Bitcoin Wallet within 5-15 minutes using “Sagemath pollard rho function: (discrete_log_rho)” and “ Chinese Remainder Theorem” .
In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we can get partial private key values and restore a Bitcoin Wallet within 5-15 minutes using “Sagemath pollard rho function: (discrete_log_rho)” and “ Chinese Remainder Theorem” .
Chowkidar automates security scans, leveraging open-source tools to identify vulnerabilities. Users simply input project details to receive detailed, actionable reports, ensuring robust security with minimal effort.
WordPress vulnerability scanner
NetGun is a free and open source tool for port scanning, services enumeration, misconfigurations testing and CVE research
In the context of web application penetration testing, Google Dorks can be used to find vulnerabilities and sensitive information in websites. This involves searching for specific keywords or file types that can indicate the presence of vulnerabilities or sensitive information, such as login pages, database files, and backups.
scantxt is a common way to allow/disallow scanning activity with additional features for ownership verification, notifications and scanning verification
Official Repository for V-Shark
Automation System for Vulnerability Identification Using SBOM
V-Scanner: A tool for web application security testing
A sample vulnerable Ruby on Rails application instrumented with the Contrast Security Agent. Used for evaluating the Contrast Security agent and platform.
Add a description, image, and links to the vulnerability-scanners topic page so that developers can more easily learn about it.
To associate your repository with the vulnerability-scanners topic, visit your repo's landing page and select "manage topics."