gmatuz / inthewilddb
Hourly updated database of exploit and exploitation reports
☆253Updated 3 weeks ago
Alternatives and similar repositories for inthewilddb:
Users that are interested in inthewilddb are comparing it to the libraries listed below
- Find CVE PoCs on GitHub☆142Updated last year
- A source code static analysis platform for AppSec enthusiasts.☆232Updated 2 weeks ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆141Updated 2 years ago
- Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploi…☆140Updated last year
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆256Updated 7 months ago
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆126Updated this week
- Black box fuzzer for web applications☆421Updated 7 months ago
- 🔑 Authz0 is an automated authorization test tool. Unauthorized access can be identified based on URLs and Roles & Credentials.☆401Updated 3 months ago
- Session Hijacking Visual Exploitation☆194Updated 11 months ago
- Nebula is a cloud C2 Framework, which at the moment offers reconnaissance, enumeration, exploitation, post exploitation on AWS, but still…☆410Updated last week
- mx-takeover focuses DNS MX records and detects misconfigured MX records.☆346Updated last year
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆99Updated last year
- Nuclei templates for honeypots detection.☆196Updated last year
- Tool for searching Exploits from Exploit Databases, etc.☆272Updated last week
- A suite for hunting suspicious targets, expose domains and phishing discovery☆344Updated 3 weeks ago
- ☆196Updated 3 months ago
- Weekly updated list of missing CVEs in nuclei templates official repository. Mainly built for bug bounty, but useful for penetration test…☆348Updated this week
- Vulnerability assessment and penetration testing automation and reporting platform for teams.☆441Updated 2 months ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆430Updated last year
- A library for detecting known secrets across many web frameworks☆584Updated this week
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆330Updated last year
- Source Code Management Attack Toolkit☆213Updated 2 years ago
- Divide full port scan results and use it for targeted Nmap runs☆315Updated 7 months ago
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆331Updated 2 months ago
- Tool to discover external and internal network attack surface☆193Updated 8 months ago
- Zero-dollar attack surface management tool☆269Updated 10 months ago
- Discover new target domains using Content Security Policy☆393Updated this week
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆196Updated 2 months ago
- Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator☆169Updated 3 years ago
- Curated list of open-source & paid Attack Surface Monitoring (ASM) tools.☆372Updated 4 months ago