Explore 12 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
A threat intelligence and vulnerability monitoring platform that aggregates security alerts from trusted sources and provides customizable monitoring and notification capabilities.
A threat intelligence and vulnerability monitoring platform that aggregates security alerts from trusted sources and provides customizable monitoring and notification capabilities.
A CVE compliant archive of public exploits and corresponding vulnerable software, and a categorized index of Internet search engine queries designed to uncover sensitive information.
A CVE compliant archive of public exploits and corresponding vulnerable software, and a categorized index of Internet search engine queries designed to uncover sensitive information.
Linux privilege escalation auditing tool for detecting security deficiencies in Linux kernels.
Linux privilege escalation auditing tool for detecting security deficiencies in Linux kernels.
A Burp plugin for identifying potential vulnerabilities in web applications
A Burp plugin for identifying potential vulnerabilities in web applications
The CVE Program catalogs publicly disclosed cybersecurity vulnerabilities.
The CVE Program catalogs publicly disclosed cybersecurity vulnerabilities.
Next-generation Linux exploit suggester with improved features for finding privilege escalation vulnerabilities.
Next-generation Linux exploit suggester with improved features for finding privilege escalation vulnerabilities.
Apache 2 based honeypot for detecting and blocking Struts CVE 2017-5638 exploit with added support for content disposition filename parsing vulnerability.
A vulnerability management tool for macOS that monitors and detects vulnerabilities in over 100 apps.
A vulnerability management tool for macOS that monitors and detects vulnerabilities in over 100 apps.
A platform providing an activity feed on exploited vulnerabilities.
Scans Alpine base images for vulnerabilities using Multi Stage builds in Docker 17.05
Scans Alpine base images for vulnerabilities using Multi Stage builds in Docker 17.05
A tool to find and search for registered CVEs, creating a local CVE database for offline use.
A tool to find and search for registered CVEs, creating a local CVE database for offline use.
Automate version scraping and vulnerability scanning for Ruby on Rails stacks.
Automate version scraping and vulnerability scanning for Ruby on Rails stacks.