Skip to content
#

vulnerability-assessment

Here are 271 public repositories matching this topic...

Client Overview Artemis Financial, a firm engaged in international financial transactions, required a modernization of its operations with a strong focus on software security. The primary issue addressed was the safeguarding of their web-based applications to protect sensitive financial data, comply with international and domestic regulations, and

  • Updated Apr 22, 2024

ShadowStrike is an interactive bash script for educational SSH brute force simulation. User-configurable with error handling, it leverages Hydra to automate attacks. Ideal for controlled security testing and learning about vulnerabilities.

  • Updated Nov 26, 2023
  • Shell

The Metasploit-Termux-Installer script automates the setup of Metasploit Framework on Termux, enabling penetration testing on Android. It updates packages, installs dependencies, fetches Metasploit, and configures the environment for seamless use, allowing you to run Metasploit tools like `msfconsole` directly from your terminal.

  • Updated Aug 2, 2024
  • Shell

Vigilante Vixen has learned that there were many security vulnerabilities from their technical, behavioral, law, and human resources aspects. Despite us not being directly involved in offshore financial services or the legal profession, technology roles have a considerable amount of opportunity to review this case and implement security regulations

  • Updated Oct 27, 2023

Improve this page

Add a description, image, and links to the vulnerability-assessment topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the vulnerability-assessment topic, visit your repo's landing page and select "manage topics."

Learn more