Rezilion / mi-x
Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploitability (runtime execution, configuration, permissions, existence of a mitigation, OS, etc..)
☆140Updated last year
Related projects ⓘ
Alternatives and complementary repositories for mi-x
- Find CVE PoCs on GitHub☆137Updated last year
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆239Updated last year
- ☆115Updated last year
- ☆193Updated 3 weeks ago
- Tool to discover external and internal network attack surface☆192Updated 5 months ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆174Updated 2 years ago
- First iteration of ML based Feedback WAF☆56Updated 7 months ago
- A GraphQL enumeration and extraction tool☆128Updated last year
- Source Code Management Attack Toolkit☆210Updated 2 years ago
- A source code static analysis platform for AppSec enthusiasts.☆203Updated last month
- Recurrent Neural Network SubDomain Discovery Tool☆89Updated 2 years ago
- Emulate and Dissect MSF and *other* attacks☆139Updated 8 months ago
- ☆175Updated last week
- ☆104Updated 2 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆75Updated last year
- A curated list of argument injection vectors☆37Updated 2 months ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆141Updated last year
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆85Updated 2 years ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆137Updated last year
- PCAP visualization tool☆101Updated last year
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆68Updated 3 years ago
- Link sources to sinks in C# applications.☆140Updated last year
- Hourly updated database of exploit and exploitation reports☆242Updated this week
- A little bit less hackish way to intercept and modify non-HTTP protocols through Burp & others.☆202Updated 2 years ago
- ☆110Updated last year
- d(ockerp)wn - a docker pwn tool manager☆155Updated 3 years ago
- ☆90Updated 3 years ago
- Citrix Scanner for CVE-2023-3519☆48Updated last year
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆58Updated 4 months ago
- Powerglot encodes offensive powershell scripts using polyglots . Offensive security tool useful for stego-malware, privilege escalation, …☆165Updated 4 years ago