This repository contains information on the CVEs I found.
☆52Mar 10, 2024Updated 2 years ago
Alternatives and similar repositories for vulnerability-research
Users that are interested in vulnerability-research are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The repository contains useful GitHub dorks for finding open-source vulnerabilities.☆96Feb 16, 2024Updated 2 years ago
- API fuzzer that exposes security flaws by sending malformed inputs☆16Sep 4, 2024Updated last year
- JavaScript (Node) Call Flooder☆13Mar 11, 2021Updated 5 years ago
- a .js scanner, built in php. designed to scrape urls and other info☆24Aug 22, 2017Updated 8 years ago
- Nuclei templates for drupal vulns... far from perfect☆19Jan 9, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- An automation tool that scans sub-domains, sub-domain takeover and then filters out xss, ssti, ssrf and more injection point parameters.☆19Sep 9, 2025Updated 7 months ago
- Here we are gather all Nuclei Templates that are Publically available.☆15Apr 28, 2024Updated last year
- Build connected security experiences. Starting point to share code, libraries, notebooks, workbooks, and queries for connected experience…☆25Apr 14, 2024Updated last year
- This repo contains the code for my secure code review challenges. People used this as the primary resource to pass FAANG AppSec interview…☆334Mar 12, 2026Updated 3 weeks ago
- ☆10Apr 20, 2022Updated 3 years ago
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆98Oct 4, 2024Updated last year
- Tools used for Pentesting☆22Apr 21, 2023Updated 2 years ago
- Source Code Review resources for Bug Bounty Hunters & Developers. This Repo is updated consistently.☆80Dec 30, 2021Updated 4 years ago
- A thief of discord accounts and Bitcoin wallets (Captures other logins from sites including steam, paypal, sellix and several other sites…☆10Jul 20, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- r3conwhale aims to develop a multifunctional recon chain for web applications, intelligently interpreting collected data, and optimizing …☆14Jul 3, 2024Updated last year
- This is a python script which automatically generates metepreter tcp or https shellcode encodes it and slaps some Behavioural detection i…☆14Feb 13, 2023Updated 3 years ago
- Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence☆78Oct 6, 2023Updated 2 years ago
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated last year
- Collection of scripts that I created to make my life easier.☆12May 10, 2021Updated 4 years ago
- Audits AD hashdump and looks for instances for password reuse☆12Nov 12, 2019Updated 6 years ago
- Simple shellcode injection in Nim encrypted in XOR☆22Aug 21, 2023Updated 2 years ago
- Template Nuclei SSTI☆34Nov 18, 2025Updated 4 months ago
- OsintifyX: Powerful Open-source OSINT tool for extracting valuable information from Instagram profiles. OSINT: Instagram Forensics Tool☆11Feb 19, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆14Dec 28, 2024Updated last year
- Leverages B64 chunks to split files and save to clipboard☆26Dec 7, 2025Updated 4 months ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- InfoSec Notes☆63Mar 23, 2024Updated 2 years ago
- jaVasCript:/*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert() )//%0D%0A%0d%0a//</stYle/</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert()…☆11Apr 9, 2021Updated 5 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- Regex patterns for manual application source code review☆33Dec 14, 2020Updated 5 years ago
- A Burp Suite extension that converts IP addresses to decimal notation, useful for SSRF bypass and WAF evasion testing. Created by Harshad…☆11Dec 9, 2024Updated last year
- NetGun is a free and open source tool for Vulnerability Assessment, port scanning, services enumeration, misconfigurations testing and CV…☆12Jul 25, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- flask-webgoat is a deliberately-vulnerable application written with the Flask web framework.☆19Sep 5, 2025Updated 7 months ago
- xsschecker tests endpoints for reflected XSS by injecting payloads and checking responses. It prints vulnerable if the payload is reflect…☆36Nov 3, 2025Updated 5 months ago
- ☆59Nov 13, 2024Updated last year
- Self sustainable DOM content fuzzy hashing☆11Oct 5, 2024Updated last year
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- ☆24Nov 18, 2023Updated 2 years ago
- ☆18Apr 9, 2024Updated 2 years ago