Vulnerability Management

158 tools and resources

Tags in this Category

FEATURED

Showcase your innovative cybersecurity solution to our dedicated audience of security professionals.

Reach out!

NEW

A comprehensive online resource for application security knowledge

A local privilege escalation vulnerability in the Linux kernel known for its catchy name and potential damages.

A disclosure of a bug found in Twitter's Vine and the process of procuring the source code.

The Node.js Bug Bounty Program is a program aimed at identifying and fixing security vulnerabilities in the Node.js ecosystem.

CVE Logo

CVE

0 (0)

The CVE Program catalogs publicly disclosed cybersecurity vulnerabilities.

A tool that showcases the attack surface of a given Android device, highlighting potential vulnerabilities and security risks.

A collection of real-world scenarios to evaluate command injection detection and exploitation abilities

WPScan Logo

WPScan

0 (0)

WordPress security scanner for identifying vulnerabilities in WordPress websites.

A tool that checks for hijackable packages in NPM and Python Pypi registries

Next-generation Linux exploit suggester with improved features for finding privilege escalation vulnerabilities.

CSET is a free software tool for identifying vulnerabilities in enterprise and industrial control cyber systems.

A vulnerable web site in NodeJS for testing security source code analyzers.

Pagodo Logo

Pagodo

0 (0)

Automate Google Hacking Database scraping and searching with Pagodo, a tool for finding vulnerabilities and sensitive information.

A fully customizable, offensive security reporting solution for pentesters, red teamers, and other security professionals.

A repository containing hourly-updated data dumps of bug bounty platform scopes

A tool that finds unprotected secrets in container images or file systems, matching against a database of 140 secret types.

Tool to identify and understand code-injection vulnerabilities in Windows 7 UAC whitelist system.

CRT sh Logo

CRT sh

0 (0)

Crt.sh is a website that allows users to search for SSL/TLS certificates of a targeted domain, providing transparency into certificate logs.

NMAP Logo

NMAP

0 (0)

Nmap is an essential network scanning tool used for network security auditing and status monitoring.

23
4
56