Vulnerability Management

158 tools and resources

Tags in this Category

FEATURED

Showcase your innovative cybersecurity solution to our dedicated audience of security professionals.

Reach out!

NEW

Deliberately vulnerable web application for security professionals to practice attack techniques.

Script to find exploits for vulnerable software packages on Linux systems using an exploit database.

Nikto Logo

Nikto

0 (0)

Web server scanner for identifying security vulnerabilities.

Krypton

0 (0)

A wargame designed to test your hacking skills and knowledge

AuditJS Logo

AuditJS

0 (0)

Audits JavaScript projects for known vulnerabilities and outdated package versions using OSS Index v3 REST API.

Linux privilege escalation auditing tool for detecting security deficiencies in Linux kernels.

Censys Logo

Censys

0 (0)

A search engine for the Internet of Things (IoT) that provides real-time information about connected devices.

An extensible, heuristic-based vulnerability scanning tool for installed npm packages.

A collection of 132 exploits added to Packet Storm in April 2024

A tool for scanning websites with open .git repositories and dumping their content for Bug Hunting/Pentesting Purposes.

A tool to run YARA rules against node_module folders to identify suspicious scripts

JS-Scan Logo

JS-Scan

0 (0)

A JavaScript scanner built in PHP for scraping URLs and other information.

A demonstration site for the Acunetix Web Vulnerability Scanner, intentionally vulnerable to various web-based attacks.

FuzzDB Logo

FuzzDB

0 (0)

A comprehensive open dictionary of fault injection patterns and predictable resource locations for dynamic application security testing

A vulnerable Android application demonstrating various security issues and vulnerabilities

DShield Logo

DShield

0 (0)

A Pythonic interface to the Internet Storm Center / DShield API

A tool that assesses AWS accounts for subdomain hijacking vulnerabilities in Route53 and CloudFront configurations.

A presentation about the OWASP Top 10, a list of the most critical security risks to web applications.

1
2
34