CVE PoCs
☆21Jul 16, 2020Updated 5 years ago
Alternatives and similar repositories for CVE_PoCs
Users that are interested in CVE_PoCs are comparing it to the libraries listed below
Sorting:
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Dec 29, 2021Updated 4 years ago
- ☆28Sep 25, 2020Updated 5 years ago
- Fast AEM scope gathering tool for all your public and private BugCrowd Programs☆10Jul 14, 2021Updated 4 years ago
- Crawlex is a powerful Chrome extension designed to assist bug bounty hunters in their work by enabling easy crawling of all possible URLs…☆12May 28, 2023Updated 2 years ago
- Extract SSL certificate data (Subject Name, Subject Alt Names, Organisation)☆42Nov 10, 2025Updated 4 months ago
- Scripts/tools to destroy things☆17Sep 13, 2021Updated 4 years ago
- Compiled dataset of Java deserialization CVEs☆60Aug 31, 2020Updated 5 years ago
- Saves pages to Wayback machine☆12Dec 2, 2024Updated last year
- ☆13Feb 14, 2022Updated 4 years ago
- Generic plugin based web application security fuzzing for anomalies by Slándáil Research Limited☆13Feb 13, 2024Updated 2 years ago
- Find CVEs that don't have a Detectify modules.☆22Mar 28, 2023Updated 2 years ago
- Service-Now Article Bruteforcer☆16Jun 5, 2020Updated 5 years ago
- Content-Type Research☆658Jun 29, 2025Updated 8 months ago
- A Mozilla Firefox extension which allows quick access to your google-dorking result☆19Jun 18, 2020Updated 5 years ago
- Reconness Agents Script☆32Jul 25, 2022Updated 3 years ago
- Python Script to Print the name of the companies that are acquired by a Target Company and the Time of Acquisition.☆26Dec 5, 2021Updated 4 years ago
- Bugbounty utility to store list of enumerated subdomains into an sqlite3 db [one liner style / Pipe and save]☆29Jan 6, 2021Updated 5 years ago
- a tool that compiles a csv of all h1 program stats☆49Jul 2, 2023Updated 2 years ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Dec 24, 2013Updated 12 years ago
- ☆76Nov 30, 2020Updated 5 years ago
- Caido's passive workflow to find potential leaked secrets, PII, and sensitive fields.☆21Jan 13, 2025Updated last year
- A Tool for Domain Flyovers☆18Nov 12, 2019Updated 6 years ago
- Jarida (Jadx + Frida) is a Jadx GUI plugin that lets you trace and optionally patch Java method return values at runtime using Frida, dir…☆88Mar 6, 2026Updated 2 weeks ago
- Some private tools i decided to release for public.☆49Mar 14, 2024Updated 2 years ago
- [+]An Automation Tool Based on [ securitytrails.com ]☆17Jun 3, 2021Updated 4 years ago
- BugBounty , sort and delete duplicates param value without missing original value☆22Jul 31, 2021Updated 4 years ago
- InfiniteWP Client < 1.9.4.5 - Authentication Bypass☆21Jul 28, 2021Updated 4 years ago
- List of configuration files from WEB-INF and META-INF for use in Unvalidated Forwards and JSP Include vulnerabilities.☆84Mar 23, 2018Updated 7 years ago
- Collection of tools to interact with Intigriti website☆17Aug 10, 2024Updated last year
- ☆10Nov 24, 2018Updated 7 years ago
- HackerOne Wallpapers☆76Apr 20, 2021Updated 4 years ago
- Spring Framework RCE via Data Binding on JDK 9+ / spring4shell / CVE-2022-22965☆14Apr 4, 2022Updated 3 years ago
- Python Web framework P0wner☆75Jan 27, 2013Updated 13 years ago
- Fernbach is a vulnerable API written in the Flask micro web framework. The intent of this API is for testing the OWASP top ten vulnerabil…☆30Feb 4, 2022Updated 4 years ago
- Script to test open Akamai ARL vulnerability.☆69Aug 11, 2021Updated 4 years ago
- A tool to do basic fingerprinting across a large number of hosts☆11Oct 20, 2020Updated 5 years ago
- Get all the CNs from a list of domains☆45Aug 17, 2021Updated 4 years ago
- view RedFlagDeals.com from the command line☆10Jul 6, 2024Updated last year