Patrowl / PatrowlHearsDataLinks
Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds
β139Updated this week
Alternatives and similar repositories for PatrowlHearsData
Users that are interested in PatrowlHearsData are comparing it to the libraries listed below
Sorting:
- πNVD exploit & JVN(Japan Vulnerability Notes) easy descriptionβ93Updated this week
- Hourly updated database of exploit and exploitation reportsβ258Updated 11 months ago
- πCVE Simple Listβ74Updated this week
- EPSS & VEDAS Score Aggregator for CVEsβ255Updated last week
- Come inside, and have a nice cup of tea.β109Updated 7 months ago
- First iteration of ML based Feedback WAFβ59Updated last year
- Deobfuscate Log4Shell payloads with ease.β170Updated 3 years ago
- β45Updated 3 years ago
- Vulnerable Client-Server Application (VuCSA) is made for learning how to perform penetration tests of non-http thick clients. It is writtβ¦β99Updated 2 years ago
- AutoSpearβ70Updated last year
- SCodeScanner stands for Source Code scanner where the user can scans the source code for finding the Critical Vulnerabilities.β163Updated 2 years ago
- Trends Website (URL) from Twitter hackers.β109Updated this week
- Find CVE PoCs on GitHubβ156Updated 4 months ago
- An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.β182Updated 3 weeks ago
- Tool to discover external and internal network attack surfaceβ204Updated last year
- IoT and Operational Technology Honeypotβ106Updated 2 years ago
- Nmap script to guess* a GitLab version.β247Updated 2 months ago
- πNVD Databaseβ115Updated this week
- Chat automates Nuclei template generationβ108Updated 2 years ago
- a lightweight, flexible and novel open source poc verification frameworkβ237Updated 3 years ago
- Totally Insecure Web Application Project (TIWAP)β177Updated 2 years ago
- A guided mutation-based fuzzer for ML-based Web Application Firewallsβ196Updated last year
- Tool for searching Exploits from Exploit Databases, etc.β292Updated last week
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.β59Updated 2 years ago
- With the help of this automated script, you will never lose track of recently released CVEs.β53Updated 3 years ago
- This tool helps new security professionals actively learn how to address security concerns associated with open ports on a network deviceβ¦β22Updated 2 weeks ago
- Automatically collects the known CVE and its corresponding Poc, and sends it to the LLM for analysis, disassembles the attack steps, geneβ¦β20Updated last year
- SAIVS (Spider Artificial Intelligence Vulnerability Scanner).β54Updated 5 years ago
- Cloud Penetration Testing Toolkitβ106Updated 5 months ago
- A fingerprint generation helper for nuclei network templatesβ78Updated 3 years ago