anantshri / wpvulndb_cmdView external linksLinks
A commandline vulnerability reporter using WP-CLI and WPVulnDB
☆31Sep 27, 2025Updated 4 months ago
Alternatives and similar repositories for wpvulndb_cmd
Users that are interested in wpvulndb_cmd are comparing it to the libraries listed below
Sorting:
- Repository to track keywords & patterns lists used by crowdsec parsers and scenarios☆16Dec 18, 2025Updated last month
- ⛔ DEPRECATED: A secure jenkins installation☆17Jul 23, 2019Updated 6 years ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Sep 18, 2017Updated 8 years ago
- Simple proxy designed to intercept and modify connections on the transport level. This means you can also modify TLS raw bytes.☆17Dec 13, 2021Updated 4 years ago
- only for 31337☆24Nov 19, 2016Updated 9 years ago
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆20Sep 2, 2015Updated 10 years ago
- Threat Modeling Manifesto☆30Jul 18, 2024Updated last year
- ☆25Feb 2, 2026Updated last week
- A map of the botnet attacking our server☆14Aug 24, 2017Updated 8 years ago
- Automatic attack detector and botnet classifier☆28Jan 10, 2017Updated 9 years ago
- A fuzzing script for MitmProxy☆24May 15, 2015Updated 10 years ago
- PhpSecInfo provides an equivalent to the phpinfo() function that reports security information about the PHP environment, and offers sugge…☆47Sep 11, 2011Updated 14 years ago
- revealjs workflow automation: reveal.js + external markdown mixed with some bash awesomeness to automate routine presentation tasks☆29May 9, 2025Updated 9 months ago
- OWASP ZAP addon for finding vulnerabilities in JWT Implementations☆35Mar 3, 2025Updated 11 months ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- Informações extras referentes ao Treinamento Novo Pentest Profissional - https://desecsecurity.com/novo-pentest-profissional☆15May 13, 2023Updated 2 years ago
- Single-threaded epoll-based concurrent bulk whois client☆31Oct 31, 2017Updated 8 years ago
- Arp spoof detection tool☆26Jun 30, 2017Updated 8 years ago
- ☆31Feb 3, 2026Updated last week
- Find the query causing your performance issues☆28Oct 20, 2016Updated 9 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Nov 12, 2016Updated 9 years ago
- ☆11Jun 23, 2022Updated 3 years ago
- CVE-2018-9276 PRTG < 18.2.39 Authenticated Command Injection (Reverse Shell)☆36Dec 3, 2020Updated 5 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆35Nov 14, 2016Updated 9 years ago
- Repository for Endpoint Security Testing☆35Jul 26, 2018Updated 7 years ago
- Hardware specifications and schematics for the Worldcoin Orb.☆10Jul 18, 2023Updated 2 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16May 3, 2014Updated 11 years ago
- SMB Auto authentication Vulnerability☆34Aug 1, 2016Updated 9 years ago
- Want to test your applications using the latest OWASP security toolchains and the NIST National Vulnerability Database using Jenkins, Ans…☆56Nov 2, 2018Updated 7 years ago
- black Ip lists, dorks-collection☆16Feb 1, 2026Updated last week
- ☆11Jun 22, 2023Updated 2 years ago
- Secure access cloud terraform provider☆13Updated this week
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- Compiling a list of free learning resources in different areas of tech☆13Jul 19, 2023Updated 2 years ago
- Burp extension to fuzz/brute force GenAI/LLM prompts for potential behvioural and Prompt Injection vulnerabilities.☆13Sep 3, 2025Updated 5 months ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Run a diff between two yaml files.☆19Jul 19, 2022Updated 3 years ago
- Cipher Suite Checker☆12Mar 22, 2023Updated 2 years ago