Here you will find information and examples about the most known vulnerabilities in the Bug Bounty world! [ EN ESPAÑOL ]
☆14Oct 23, 2021Updated 4 years ago
Alternatives and similar repositories for CommonWebVulns
Users that are interested in CommonWebVulns are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Depstubber generates type-correct stubs for Go dependencies, for use in testing☆17Mar 21, 2025Updated last year
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- ☆14Feb 25, 2022Updated 4 years ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆27Aug 4, 2022Updated 3 years ago
- Cobalt Strike DNS beacon parser☆11Nov 29, 2021Updated 4 years ago
- Simple volatility profile builder based on Docker container☆21Aug 24, 2020Updated 5 years ago
- hackxpert labs☆18Jun 29, 2022Updated 3 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- dlopen() filelessly a shared object or even a program (and run it).☆57Aug 31, 2023Updated 2 years ago
- POC for CVE-2020-13151☆39Aug 3, 2020Updated 5 years ago
- ☆15Dec 3, 2025Updated 3 months ago
- DKMS build for missing kmod dummy_hcd in Ubuntu☆12Aug 10, 2017Updated 8 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Feb 9, 2020Updated 6 years ago
- ☆12Jun 20, 2020Updated 5 years ago
- CTF challenge solutions and writeups☆11Mar 2, 2024Updated 2 years ago
- This is GitHub_Dorks and some tips i collect from different resources.Recon_Api is tip when you find token or api without knowing what to…☆21Sep 15, 2021Updated 4 years ago
- Run CodeQL queries at scale using Multi-Repository Variant Analysis (MRVA)☆61Apr 16, 2025Updated 11 months ago
- Kraken, a modular multi-language webshell coded by @secu_x11☆550Feb 10, 2024Updated 2 years ago
- Accompanying material needed for the workshop☆11Jun 14, 2023Updated 2 years ago
- Proof Of Concept that exploits PuTTy CVE-2024-31497.☆11May 11, 2024Updated last year
- Ghost Blog Docker Container☆10Jun 28, 2021Updated 4 years ago
- Certificate based authentication example using Docker and NGINX☆10Jan 28, 2021Updated 5 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆30Aug 11, 2023Updated 2 years ago
- Python3 Scripts for OSCP buffer overflow exploitation☆12May 12, 2021Updated 4 years ago
- POC for GitLabs Authenticated RCE in version 11.4.7 community edition☆13Feb 8, 2021Updated 5 years ago
- SyzScope is a research project that aims to reveal high-risk security bug from Syzbot. Learn more details in our paper.☆24Nov 17, 2021Updated 4 years ago
- Spring Boot with FreeMarker - Server Side Template Injection example☆17Jan 28, 2019Updated 7 years ago
- Same Origin XSS challenge☆64Apr 7, 2022Updated 3 years ago
- Questions to ask the company during your interview☆11Sep 20, 2019Updated 6 years ago
- LXD Image: Alpine 3.7 (Apache, PHP5.6)☆13Apr 5, 2018Updated 7 years ago
- Programmatic Electron fuse detection☆21Jul 2, 2024Updated last year
- ☆20Jan 12, 2022Updated 4 years ago
- Bug's feed is a local hosted portal where you can search for the latest news, videos, CVEs, vulnerabilities...☆93Aug 31, 2022Updated 3 years ago
- Homelab repo - ansible for provisioning, k3s cluster, gitops, vault, wireguard and other goodies.☆21Mar 14, 2026Updated last week
- Lots of POC Codes & Preparation materials, scripts, discovery processes in there.☆15Feb 8, 2024Updated 2 years ago
- Mitrastar MIPS router analysis and exploitation☆19Jul 25, 2021Updated 4 years ago
- this javascript file creates a pop-up for your xss poc.☆28Jan 10, 2017Updated 9 years ago
- Soluciones a problemas de programación de la web Acepta el Reto☆21Dec 23, 2025Updated 3 months ago
- xdebug reverse shell☆22Jan 18, 2018Updated 8 years ago