Category: Vulnerability Analysis

GyoiThon

GyoiThon: growing penetration test tool using Machine Learning

GyoiThon GyoiThon is a growing penetration test tool using Machine Learning. It identifies the software installed on the web server (OS, Middleware, Framework, CMS, etc…) based on the learning data. After that, it executes valid exploits for the identified...

dependency-track

dependency-track v3.2.2 releases: intelligent Software Composition Analysis (SCA) platform

Dependency-Track Modern applications leverage the availability of existing components for use as building blocks in application development. By using existing components, organizations can dramatically decrease time-to-market. Reusing existing components, however, comes at a cost....

django-DefectDojo

django-DefectDojo v1.5.3 releases: application vulnerability correlation & security orchestration application

DefectDojo is an open-source application vulnerability correlation and security orchestration application. It allows you to manage your application security program, maintain product and application information, schedule scans, triage vulnerabilities and push findings into defect...

MIDA-Multitool

MIDA-Multitool: system enumeration, vulnerability identification and privilege escalation

MIDA-Multitool – Bash script purposed for system enumeration, vulnerability identification, and privilege escalation.MIDA Multitool draws functionality from several of my previous scripts namely SysEnum and RootHelper and is in many regards RootHelpers successor. Besides functionality from these two previous...

Dagda

dagda v0.7 releases: perform static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats

Dagda is a tool to perform static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers and to monitor the docker daemon and running Docker containers for detecting anomalous activities....