Probely / vulnerabilities-knowledge-baseLinks
Vulnerability
☆32Updated last month
Alternatives and similar repositories for vulnerabilities-knowledge-base
Users that are interested in vulnerabilities-knowledge-base are comparing it to the libraries listed below
Sorting:
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 5 years ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆144Updated 2 years ago
- A natural evolution of Burp Suite's Repeater tool☆94Updated 2 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆76Updated 3 years ago
- ☆76Updated 5 years ago
- ☆72Updated 7 years ago
- Find the remote website version based on a git repository☆126Updated 4 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆44Updated last year
- REST API backend for Reconmap☆46Updated this week
- A list of queries and actions that I repeat over and over again☆65Updated 5 years ago
- ☆48Updated 4 years ago
- ☆26Updated 3 years ago
- ☆21Updated 8 years ago
- learning case to prepare OSWE☆37Updated 6 years ago
- ☆90Updated 3 years ago
- Burp Suite Extension to monitor new scope☆17Updated 4 years ago
- Workshop given at Hack in Paris 2019☆125Updated 2 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- BurpSuite using the document and some extensions☆71Updated 5 years ago
- Upload files done during my research.☆167Updated last week
- a shared short domain for XSS and other hacks☆32Updated 3 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Updated 4 years ago
- Use normal web pentest tools to hack Websockets☆18Updated 6 years ago
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆57Updated 5 years ago
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 3 years ago
- Scripts and tools for AWS Pentest☆53Updated 5 years ago
- A simple remote scanner for Atlassian Jira☆121Updated 2 years ago
- Weaponizing Live CT logs for automated monitoring of assets☆133Updated 4 years ago
- ☆54Updated 10 months ago