Probely / vulnerabilities-knowledge-baseLinks
Vulnerability
☆32Updated 3 months ago
Alternatives and similar repositories for vulnerabilities-knowledge-base
Users that are interested in vulnerabilities-knowledge-base are comparing it to the libraries listed below
Sorting:
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆75Updated 2 years ago
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- ☆67Updated 6 years ago
- ☆48Updated 4 years ago
- Searching for virtual hosts among non-resolvable domains☆88Updated 5 years ago
- ☆76Updated 4 years ago
- A list of queries and actions that I repeat over and over again☆64Updated 4 years ago
- Workshop given at Hack in Paris 2019☆122Updated 2 years ago
- ☆90Updated 3 years ago
- ☆26Updated 3 years ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆143Updated 2 years ago
- Find the remote website version based on a git repository☆126Updated 4 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 5 years ago
- Mindmaps allow to organize and understand information faster and better.☆2Updated 3 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆43Updated 6 months ago
- Burp Suite Extension to monitor new scope☆17Updated 4 years ago
- A simple remote scanner for Atlassian Jira☆121Updated 2 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆42Updated last year
- Clientside vulnerability / reflected xss fuzzer☆150Updated 2 years ago
- ☆21Updated 7 years ago
- Tools to assess the DNS security of web applications☆128Updated 2 years ago
- REST API backend for Reconmap☆47Updated last week
- ☆166Updated 3 years ago
- A natural evolution of Burp Suite's Repeater tool☆93Updated last year
- ☆94Updated 3 years ago
- Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.☆112Updated 3 years ago
- Security Advisories☆34Updated 3 weeks ago
- ☆44Updated 3 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago
- Weaponizing Live CT logs for automated monitoring of assets☆135Updated 3 years ago