Vulnerability
☆33Oct 31, 2025Updated 4 months ago
Alternatives and similar repositories for vulnerabilities-knowledge-base
Users that are interested in vulnerabilities-knowledge-base are comparing it to the libraries listed below
Sorting:
- Lab Material for the One-Day Web Application Penetration Testing Fundamentals Course☆10Jun 22, 2021Updated 4 years ago
- Minimal version for https://github.com/zmap/zgrab.☆16Sep 17, 2022Updated 3 years ago
- GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to ma…☆27Mar 8, 2023Updated 2 years ago
- ☆20Jun 16, 2019Updated 6 years ago
- A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit.☆18Nov 11, 2021Updated 4 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆29Aug 20, 2024Updated last year
- Postfix SMTP Smuggling - Expect Script POC☆23Dec 26, 2023Updated 2 years ago
- ☆35Aug 30, 2024Updated last year
- Resources for AD penetration testing and security☆33Feb 21, 2022Updated 4 years ago
- ☆10Jun 16, 2021Updated 4 years ago
- Whitebox source code review cheatsheet (Based on AWAE syllabus)☆168Feb 16, 2022Updated 4 years ago
- Tool for sending APDU in a simple way☆14Nov 16, 2021Updated 4 years ago
- Python client for IP to ASN lookup services☆12Feb 21, 2026Updated last week
- ☆13Aug 19, 2015Updated 10 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Nov 29, 2015Updated 10 years ago
- Recurse through a registry, identifying values with large data -- a registry malware hunter☆45Sep 12, 2016Updated 9 years ago
- CVE-2021-40346 PoC (HAProxy HTTP Smuggling)☆41Sep 8, 2021Updated 4 years ago
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 3 years ago
- ☆12Aug 12, 2016Updated 9 years ago
- Weaponize.it is your go-to resource for gaining insights into pentesting, bug bounty hunting, and scripting.☆12Apr 3, 2025Updated 10 months ago
- Simple read/write and commentable config files for go☆11Jul 2, 2016Updated 9 years ago
- Blocking Windows EDR agents by registering an own IPC-object in the Object Manager’s namespace (CVE-2023-3280, CVE-2024-5909, CVE-2024-20…☆33Feb 27, 2025Updated last year
- Writeup of what I'm learning with PentesterLab's Bootcamp☆10May 13, 2017Updated 8 years ago
- A lightweight SailsJS boilerplate to speedup your development process☆10Nov 17, 2022Updated 3 years ago
- A Collection of all things Security☆11Sep 24, 2020Updated 5 years ago
- Creating and querying materialized views from Django.☆11Aug 13, 2021Updated 4 years ago
- Scripts and payloads for internet-wide network scanning☆17Aug 2, 2015Updated 10 years ago
- Python based Web Scraper which can discover JavaScript files and parse them for juicy information (API keys, IP's, Hidden Paths etc)☆16Feb 17, 2022Updated 4 years ago
- Script for downloading Burp Suite extension files☆11Jan 29, 2024Updated 2 years ago
- A command-line tool to tidy-up Objective-C interfaces generated with class dump tools.☆12Feb 23, 2017Updated 9 years ago
- This is the C version of the StratosphereLinuxIPS. It is mainly used for integration with Snort and other IDSs.☆12Feb 15, 2017Updated 9 years ago
- Daily scrapes of trends from Wikipedia, Google and Twitter☆11May 15, 2023Updated 2 years ago
- Wireshark captures in Windows using the WLANPi as an adapter☆13Oct 15, 2019Updated 6 years ago
- Just an example of a well-known technique to detect memory tampering via Windows Working Sets.☆18Jan 15, 2022Updated 4 years ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- ☆20Feb 22, 2021Updated 5 years ago
- Another Vulnerability Auditor - Community Edition☆13Jun 1, 2021Updated 4 years ago
- EDU token contract that powers the OS.University Network☆11May 26, 2018Updated 7 years ago
- A Node.js connector for Delta Sharing.☆12Apr 3, 2025Updated 10 months ago