bf / security-advisoriesLinks
Security advisories for vulnerabilities
☆70Updated last year
Alternatives and similar repositories for security-advisories
Users that are interested in security-advisories are comparing it to the libraries listed below
Sorting:
- Tool to teleport your HTTP requests to different Cloudflare datacenters.☆141Updated last year
- Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.☆289Updated 6 months ago
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆171Updated last month
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆103Updated 9 months ago
- Collection of my Security Blueprints & Guides☆52Updated 4 months ago
- ☆57Updated last year
- Your Swiss Army knife to analyze malicious web traffic based on mitmproxy.☆64Updated 5 months ago
- Honeyscanner: A vulnerability analyzer for honeypots☆58Updated last month
- quicmap is a simple yet quic (!) QUIC protocol scanner☆89Updated last year
- ☆101Updated 2 years ago
- JA4TScan is an active TCP server fingerprinting tool.☆103Updated last year
- PyCript Websocket is now merge into https://github.com/Anof-cyber/PyCript, this repo is not available anymore.☆82Updated last month
- An archive of 0day.today exploits☆341Updated 6 months ago
- Detection Script for MongoBleed Exploitation☆75Updated last month
- Signature based honeypot detector tool written in Golang☆108Updated 10 months ago
- A short graduate course on cybercrime, cyberespionage, and cyberoperations☆83Updated 2 months ago
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆338Updated this week
- ngrok Collaborator Link — yet another Burp Collaborator alternative for free with ngrok.☆114Updated 2 years ago
- PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.☆67Updated 2 weeks ago
- Tor onion address lookup☆59Updated last month
- Experimental tools to backdoor large language models by re-writing their system prompts at a raw parameter level. This allows you to pote…☆201Updated 4 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆109Updated 8 months ago
- ☆98Updated last year
- Modular web-application honeypot platform built using go and gin☆63Updated last year
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆142Updated 11 months ago
- Find S3 AWS/GCP/Azure buckets while surfing. S3DNS acts as DNS server, follows CNAMEs and matches any bucket pattern☆121Updated 5 months ago
- Create honeypots for cloud environments☆109Updated 4 months ago
- Collection of all previous 1337UP CTF challenges.☆79Updated last year
- ☆38Updated this week
- https://arxiv.org/abs/2412.02776☆67Updated last year