EMBA - The firmware security analyzer
-
Updated
Jun 9, 2025 - Shell
EMBA - The firmware security analyzer
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
An automation tool that scans sub-domains, sub-domain takeover, then filters out XSS, SSTI, SSRF, and more injection point parameters and scans for some low hanging vulnerabilities automatically.
The Distributed Scanning Framework for Everybody! Control Your Infrastructure, Scale Your Scanning—On Your Terms. Easily distribute arbitrary binaries and scripts using any of our nine supported cloud providers!
Wicked sick v2.0 script is intended to automate your reconnaissance process in an organized fashion.
fsp - Firestore Database Vulnerability Scanner Using APKs
CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities like SQL Injection, Cross-site scripting and other exploitable vulnerabilities.
Installation script for Ecsypno products.
Crascan is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner.
Priv8 Tools Offensive Security WordPress_AutoExploiter
A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document before using.
Multi-functional Web Recon & Vulnerability Scanner Tool
JitterBug passively searches for Basic Info, open ports, potential CVE's on the given Target IP in third party databases without Direct interaction with the target
Web Vulnerability Scanner.
SADA Webapplication Scanner
StealthNewSQL : The Ultimate NewSQL Injection Tool - Your All-in-One Solution for NewSQL Database Security! 🛡️ Uncover, exploit, and secure NewSQL database vulnerabilities with this feature-packed command-line tool. Whether you're a penetration tester, security researcher, or developer, StealthNewSQL equips you with the ultimate power! 💥
The containerized brain of the Cyber Hygiene vulnerability scanner
StealthNoSQL : The Ultimate NoSQL Injection Tool - Unleash the power of advanced NoSQL injection techniques with this comprehensive command-line tool! Whether you’re pentesting MongoDB, CouchDB, or any other NoSQL database, StealthNoSQL has you covered. 🚀💻
A client for scanning a Red Hat CoreOS (RHCOS) instance for security vulnerabilities.
MisCORS - Unleash CORS Misconfigurations Like a Digital Phantom! 🌐✨ Harness the power of MisCORS to silently unveil vulnerabilities in Cross-Origin Resource Sharing. Stealthily analyze web defenses, expose misconfigurations, and empower your security journey. 🕵️♂️🔓 Dive into the shadows of web security with MisCORS. #WebSecurity #CORSExposure
Add a description, image, and links to the vulnerability-scanner topic page so that developers can more easily learn about it.
To associate your repository with the vulnerability-scanner topic, visit your repo's landing page and select "manage topics."