gmatuz / inthewilddbLinks
Hourly updated database of exploit and exploitation reports
☆255Updated 8 months ago
Alternatives and similar repositories for inthewilddb
Users that are interested in inthewilddb are comparing it to the libraries listed below
Sorting:
- Find CVE PoCs on GitHub☆153Updated 2 months ago
- A source code static analysis platform for AppSec enthusiasts.☆261Updated 7 months ago
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆135Updated this week
- PoC_CVEs☆163Updated this week
- Nuclei templates for honeypots detection.☆195Updated last year
- Tool to discover external and internal network attack surface☆203Updated last year
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆274Updated 3 weeks ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆142Updated 2 years ago
- ☆194Updated 2 years ago
- Zero-dollar attack surface management tool☆300Updated last year
- First iteration of ML based Feedback WAF☆59Updated last year
- Divide full port scan results and use it for targeted Nmap runs☆327Updated last year
- Session Hijacking Visual Exploitation☆207Updated last year
- Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator☆168Updated 4 years ago
- Source Code Management Attack Toolkit☆222Updated 3 years ago
- Trends Website (URL) from Twitter hackers.☆104Updated this week
- Upload files done during my research.☆165Updated 5 months ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆132Updated 11 months ago
- Wordlists handcrafted (and automated) with ♥☆219Updated 2 months ago
- Secrets scanner that understands code☆153Updated 7 months ago
- Collection of resources related to phishing☆158Updated 4 years ago
- A simple tool that helps to find assets/domains based on the Google Analytics ID.☆177Updated 9 months ago
- ☆235Updated last year
- Redeye is a tool intended to help you manage your data during a pentest operation☆468Updated last year
- Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z and zip-like (jar, war,…☆106Updated 4 months ago
- Tool for searching Exploits from Exploit Databases, etc.☆288Updated this week
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆104Updated 2 months ago
- Build your own reconnaissance system with Osmedeus Next Generation☆197Updated 2 months ago
- Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)☆102Updated 3 years ago