Vulnerability
☆33Mar 6, 2026Updated 2 weeks ago
Alternatives and similar repositories for vulnerabilities-knowledge-base
Users that are interested in vulnerabilities-knowledge-base are comparing it to the libraries listed below
Sorting:
- Broken web app intentionally built with pentesting obstacles☆15Jun 21, 2019Updated 6 years ago
- GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to ma…☆28Mar 8, 2023Updated 3 years ago
- A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit.☆18Nov 11, 2021Updated 4 years ago
- Minimal version for https://github.com/zmap/zgrab.☆16Sep 17, 2022Updated 3 years ago
- Simple C# implementation of PowerUpSQL☆95Jul 8, 2024Updated last year
- Burp Intruder File Payload Generator☆18Oct 27, 2019Updated 6 years ago
- A Bash Script that parses through a PCAP file and automatically outputs valuable information about the Network Traffic.☆13May 28, 2024Updated last year
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- OWASP Foundation Web Respository☆18Mar 12, 2026Updated last week
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- BusPwn V1.0 is a powerful Modbus hacking framework designed for testing and exploiting vulnerabilities in Modbus-based systems commonly f…☆27Apr 19, 2025Updated 11 months ago
- Wi-Fi Surveying: wardriving, datasets, statistics, tools, and more.☆16Oct 10, 2023Updated 2 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆10Jan 27, 2014Updated 12 years ago
- Obtain GraphQL API schema despite disabled introspection!☆69Mar 11, 2026Updated last week
- PHP Fval(say F-word to eval) extension used to disable unsafe functions/eval with E_FATAL.☆17Sep 12, 2017Updated 8 years ago
- SharePoint scanner and fingerprinter based on WPScan☆25Oct 3, 2013Updated 12 years ago
- Snooze - Log aggregation and alerting☆10Sep 19, 2025Updated 6 months ago
- ☆19Nov 28, 2024Updated last year
- CVE-2022-21907 Vulnerability PoC☆30Jan 23, 2022Updated 4 years ago
- Sparty - MS Sharepoint and Frontpage Auditing Tool [Unofficial]☆97Nov 12, 2013Updated 12 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- ☆17Jan 9, 2025Updated last year
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- Writeup of what I'm learning with PentesterLab's Bootcamp☆10May 13, 2017Updated 8 years ago
- A Collection of all things Security☆11Sep 24, 2020Updated 5 years ago
- This tweaks the motd do be much cooler☆12May 15, 2017Updated 8 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Nov 29, 2015Updated 10 years ago
- Writeups/exploit code for CTFs I've done☆13Aug 29, 2021Updated 4 years ago
- Making your own CTF☆26Jan 5, 2021Updated 5 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Feb 20, 2026Updated last month
- Information gathering tool using OSINT and AI☆17Nov 21, 2024Updated last year
- Dockerized labs For Web Expert (OSWE) certification. Preparation for coming AWAE Training ...☆126Aug 13, 2021Updated 4 years ago
- 基于netty实现的一个数据库代理服务,可用作动态脱敏系统☆12Feb 16, 2022Updated 4 years ago
- Tool for sending APDU in a simple way☆14Nov 16, 2021Updated 4 years ago
- Build script to build Debian 10 for the FriendlyELEC NanoPi H5 based boards☆11Oct 3, 2024Updated last year
- ☆10Jun 16, 2021Updated 4 years ago
- A curated list of awesome YARA rules, tools, and people.☆33Oct 26, 2023Updated 2 years ago
- Batch modify the md5 hash of media files, which can be simply used for uploading online disk to prevent censorship. 一个 Raycast 扩展,支持批量修改媒…☆13Nov 14, 2025Updated 4 months ago
- This repository holds a target infrastructure you can use for running the nimbostratus tools.☆24Mar 9, 2015Updated 11 years ago