Patrowl / PatrowlHearsData
Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds
β126Updated this week
Alternatives and similar repositories for PatrowlHearsData:
Users that are interested in PatrowlHearsData are comparing it to the libraries listed below
- πNVD exploit & JVN(Japan Vulnerability Notes) easy descriptionβ83Updated this week
- Deobfuscate Log4Shell payloads with ease.β161Updated 2 years ago
- Tool to discover external and internal network attack surfaceβ195Updated 9 months ago
- First iteration of ML based Feedback WAFβ58Updated 11 months ago
- β41Updated 2 years ago
- Nmap script to guess* a GitLab version.β233Updated 3 weeks ago
- A cli for cracking, testing vulnerabilities on Json Web Token(JWT)β132Updated last week
- Cloud Penetration Testing Toolkitβ98Updated 3 weeks ago
- red-tldr is a lightweight text search tool, which is used to help red team staff quickly find the commands and key points they want to exβ¦β233Updated 2 years ago
- Hourly updated database of exploit and exploitation reportsβ254Updated last month
- πCVE Simple Listβ66Updated this week
- Come inside, and have a nice cup of tea.β102Updated this week
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.β54Updated last year
- Static code analysis tool based on Elasticsearchβ129Updated 4 years ago
- We publish our challenge questions for everyone.β94Updated 3 years ago
- A tool combined with the advantages of masscan and nmapβ59Updated 3 years ago
- Burp Extension for testing authorization issues. Automated request repeating and parameter value extraction on the fly.β195Updated 8 months ago
- Some Attacks of Exchange SSRF ProxyLogon&ProxyShellβ165Updated 3 years ago
- a lightweight, flexible and novel open source poc verification frameworkβ233Updated 2 years ago
- Repository of CVE found by OCD peopleβ75Updated 8 months ago
- Lupoβ-βMalware IOC Extractor. Debugging module for Malware Analysis Automationβ106Updated 2 years ago
- [ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains.β¦β174Updated 2 years ago
- Find CVE PoCs on GitHubβ144Updated last year
- β154Updated 2 years ago
- Source Code Management Attack Toolkitβ213Updated 2 years ago
- A penetration testing and vulnerability management application written using the powerful django framework.β29Updated last year
- β85Updated 2 years ago
- Suricata rules for the new critical vulnerabilitiesβ81Updated 4 years ago
- A fingerprint generation helper for nuclei network templatesβ72Updated 2 years ago
- Nuclei templates for K8S security scanningβ101Updated 3 years ago