A vulnerability is a hole or a weakness in the application, which can be a design flaw or an implementation bug, that allows an attacker to cause harm to the stakeholders of an application.
-
Updated
Jan 27, 2024
A vulnerability is a hole or a weakness in the application, which can be a design flaw or an implementation bug, that allows an attacker to cause harm to the stakeholders of an application.
An ongoing collection of php tools and frameworks, software, libraries, learning tutorials, frameworks, academic and practical resources.
Process Mutex Vulnerability Assessment Tool
Documentation about the project of a vulnerable web application.
VulnAna (Vulnerability Analyzer), a tool that ease the vulnerability management.
CISO360.AI public website
Web Security Audit
This repository contains document reports on the results of an automatic security scan. The task was "Vulnerability scan of Metasploitable2 machine using OpenVAS". The report provide detailed summary on each vulnerability, including its severity, potential impact, and recommended mitigation strategies.
GovTools is an innovative open-source toolkit for Windows, designed to streamline the extraction of password hashes from a variety of targets.
SecZz is an advanced toolkit meticulously crafted to fortify the security of Apache HTTP Server configurations. This toolkit features a collection of powerful scripts designed to address a spectrum of security concerns, providing users with a seamless and user-friendly interface for configuring and safeguarding their Apache servers.
Sleepy-Duck is an open source project created for automated security testing on application level. It can be used as an educational script to start learning about cyber-security as well as a common tool for vulnerability assessment.
Sql injection vulnerability scanner
Index-based multi-hazard vulnerability assessment methodology for churches
This is a vulnerability scanner mainly coded in python using nmap with an interactive GUI,this scanner is for Linux and macOS
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Hack Value in Cybersecurity.
• Configured Tenable Nessus' vulnerability scanner for accurate vulnerability assessments on LAN hosts before implementing the remediation strategy.
Predict severity of software vulnerabilities using Deep Neural Networks and Gradient Boosting (XGBoost)
A simple template based vulnerability scanner in python (Inspired by ProjectDiscovery's Nuclei)
Rapticore API Connector for findings stats - rapticore.com
autoscan is a VA tool for website assessment based on Bash Ccripting. It can use for Reconnaissance / Information gathering and Vulnerability Assessment
Add a description, image, and links to the vulnerability-assessment topic page so that developers can more easily learn about it.
To associate your repository with the vulnerability-assessment topic, visit your repo's landing page and select "manage topics."