ARPSyndicate / cve-scores
EPSS & VEDAS Score Aggregator for CVEs
☆237Updated this week
Alternatives and similar repositories for cve-scores
Users that are interested in cve-scores are comparing it to the libraries listed below
Sorting:
- a lightweight, flexible and novel open source poc verification framework☆235Updated 2 years ago
- PoC collection of Atlassian(Jira, Confluence, Bitbucket) products and Jenkins, Solr, Nexus☆175Updated 3 weeks ago
- Burp Extension for testing authorization issues. Automated request repeating and parameter value extraction on the fly.☆199Updated 10 months ago
- Log4j jndi injects the Payload generator☆486Updated 3 years ago
- SSRFuzz is a tool to find Server Side Request Forgery vulnerabilities, with CRLF chaining capabilities☆182Updated 4 years ago
- Afuzz is an automated web path fuzzing tool for the Bug Bounty projects.☆303Updated last year
- SSRF plugin for burp Automates SSRF Detection in all of the Request☆578Updated 4 years ago
- Small Tool written based on chaos from projectdiscovery.io☆172Updated 6 months ago
- Remote Code Injection In Log4j☆464Updated 3 years ago
- Pre-Built Vulnerable Multiple API Scenarios Environments Based on Docker-Compose.☆401Updated 2 years ago
- Proxylogon & Proxyshell & Proxyoracle & Proxytoken & All exchange server history vulns summarization :)☆527Updated last year
- cvebase is a community-driven vulnerability data platform to discover the world's top security researchers and their latest disclosed vul…☆141Updated 4 years ago
- jsubfinder searches webpages for javascript & analyzes them for hidden subdomains and secrets (wip).☆271Updated 3 months ago
- HopLa Burp Suite Extender plugin - Adds autocompletion support and useful payloads in Burp Suite☆744Updated 4 years ago
- ☆83Updated 4 years ago
- ☆121Updated 2 years ago
- Subdomains analysis and generation tool. Reveal the hidden!☆238Updated 2 months ago
- 🔍NVD exploit & JVN(Japan Vulnerability Notes) easy description☆86Updated this week
- red-tldr is a lightweight text search tool, which is used to help red team staff quickly find the commands and key points they want to ex…☆234Updated 2 years ago
- jolokia-exploitation-toolkit☆288Updated 4 months ago
- Grafana Unauthorized arbitrary file reading vulnerability☆358Updated 2 years ago
- essential templates for kenzer [DEPRECATED]☆114Updated 2 years ago
- Automatic authorization enforcement detection extension for burp suite written in Jython developed by Barak Tawily in order to ease appli…☆247Updated 5 months ago
- CVE-2020–14882、CVE-2020–14883☆283Updated 4 years ago
- RevSuit is a flexible and powerful reverse connection platform designed for receiving connection from target host in penetration.☆536Updated last year
- A Burp extension helps identifying injection flaws (LFI, RCE, SQLi), authentication/authorization issues, and HTTP 403 access violations,…☆371Updated last month
- POC for VMWARE CVE-2022-22954☆281Updated 3 years ago
- BurpBounty 魔改版本☆416Updated 3 years ago
- Nmap script to guess* a GitLab version.☆236Updated this week
- ProxyLogon Full Exploit Chain PoC (CVE-2021–26855, CVE-2021–26857, CVE-2021–26858, CVE-2021–27065)☆179Updated 3 years ago