Process Mutex Vulnerability Assessment Tool
-
Updated
Jan 9, 2018 - C++
Process Mutex Vulnerability Assessment Tool
Documentation about the project of a vulnerable web application.
VulnAna (Vulnerability Analyzer), a tool that ease the vulnerability management.
CISO360.AI public website
A vulnerability is a hole or a weakness in the application, which can be a design flaw or an implementation bug, that allows an attacker to cause harm to the stakeholders of an application.
An ongoing collection of php tools and frameworks, software, libraries, learning tutorials, frameworks, academic and practical resources.
Web Security Audit
This repository contains document reports on the results of an automatic security scan. The task was "Vulnerability scan of Metasploitable2 machine using OpenVAS". The report provide detailed summary on each vulnerability, including its severity, potential impact, and recommended mitigation strategies.
GovTools is an innovative open-source toolkit for Windows, designed to streamline the extraction of password hashes from a variety of targets.
SecZz is an advanced toolkit meticulously crafted to fortify the security of Apache HTTP Server configurations. This toolkit features a collection of powerful scripts designed to address a spectrum of security concerns, providing users with a seamless and user-friendly interface for configuring and safeguarding their Apache servers.
Sleepy-Duck is an open source project created for automated security testing on application level. It can be used as an educational script to start learning about cyber-security as well as a common tool for vulnerability assessment.
Sql injection vulnerability scanner
Index-based multi-hazard vulnerability assessment methodology for churches
This is a vulnerability scanner mainly coded in python using nmap with an interactive GUI,this scanner is for Linux and macOS
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Hack Value in Cybersecurity.
• Configured Tenable Nessus' vulnerability scanner for accurate vulnerability assessments on LAN hosts before implementing the remediation strategy.
REG-SEC-GPO is a Registry and GPO auditing and reporting PowerShell tool.
Vigilante Vixen has learned that there were many security vulnerabilities from their technical, behavioral, law, and human resources aspects. Despite us not being directly involved in offshore financial services or the legal profession, technology roles have a considerable amount of opportunity to review this case and implement security regulations
Configure and utilize OpenVAS, a vulnerability scanner, to identify and assess security vulnerabilities in a Windows virtual machine (VM). Additionally, you will perform credentialed scans, apply remediations, and verify the effectiveness of the remediation measures.
In this AKS-focused workshop, you will work with Azure and Calico Cloud to learn how to design and deploy best practices to achieve compliance with regulatory frameworks such as PCI, SOC2, HIPAA and others and secure your Kubernetes environment.
Add a description, image, and links to the vulnerability-assessment topic page so that developers can more easily learn about it.
To associate your repository with the vulnerability-assessment topic, visit your repo's landing page and select "manage topics."