edoardottt / nuclei-cve-gptLinks
[experiment] Generate Nuclei templates for CVEs using chatGPT
☆18Updated 8 months ago
Alternatives and similar repositories for nuclei-cve-gpt
Users that are interested in nuclei-cve-gpt are comparing it to the libraries listed below
Sorting:
- This repository contains random Nuclei templates I've created. Most of them based on recent security issues and exploits.☆16Updated last year
- Simple Python script to sort nuclei scans by severity and URL☆29Updated 2 years ago
- Quick tool to create custom wordlists like how fuzzers work☆10Updated last year
- A simple tool which makes creating nuclei templates even easier.☆37Updated last year
- Find CVEs that don't have a Detectify modules.☆22Updated 2 years ago
- Looks for parameters in urls☆34Updated 9 months ago
- ☆45Updated last year
- H&E- Burp Highlighter and Extractor☆18Updated 2 years ago
- bug bounty automation☆13Updated 4 years ago
- Saves pages to Wayback machine☆13Updated 8 months ago
- Automated Recon Tool Installer☆16Updated 3 years ago
- Ffuf output browser☆39Updated 2 years ago
- Automated HTTP Request Repeating With Burp Suite☆38Updated 2 years ago
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆37Updated 3 years ago
- Find subdomains by searching public certificate records☆16Updated last year
- ☆15Updated 2 years ago
- ☆14Updated last year
- List of custom Nuclei templates☆15Updated last year
- This repository presents a proof-of-concept of CVE-2023-22527☆12Updated last year
- Attempt zone transfers on domains☆17Updated 4 years ago
- ☆16Updated last year
- A BurpSuite extension for vulnerability Scanning☆27Updated last year
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Updated last year
- Reversing Citrix Gateway for XSS☆17Updated 2 years ago
- tool that generates bypasses for open redirects☆52Updated 3 years ago
- ☆15Updated 2 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated last year
- TProx is a fast reverse proxy path traversal detector and directory bruteforcer.☆29Updated 3 years ago
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆17Updated last year
- A web application attack surface mapping tool. It takes in a list of urls then performs numerous probes☆17Updated 3 years ago