gmatuz / inthewilddbLinks
Hourly updated database of exploit and exploitation reports
☆258Updated 11 months ago
Alternatives and similar repositories for inthewilddb
Users that are interested in inthewilddb are comparing it to the libraries listed below
Sorting:
- A source code static analysis platform for AppSec enthusiasts.☆265Updated 3 weeks ago
- Find CVE PoCs on GitHub☆156Updated 4 months ago
- Tool to discover external and internal network attack surface☆204Updated last year
- Zero-dollar attack surface management tool☆310Updated last year
- Trends Website (URL) from Twitter hackers.☆109Updated this week
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆280Updated 3 months ago
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆139Updated this week
- PoC_CVEs☆170Updated last month
- Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator☆168Updated 4 years ago
- Nuclei templates for honeypots detection.☆196Updated 2 years ago
- Collection of resources related to phishing☆158Updated 4 years ago
- ☆153Updated last week
- First iteration of ML based Feedback WAF☆59Updated last year
- Divide full port scan results and use it for targeted Nmap runs☆329Updated last year
- Tool for searching Exploits from Exploit Databases, etc.☆292Updated last week
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆292Updated 3 months ago
- Session Hijacking Visual Exploitation☆210Updated last year
- Repository to store exploits created by Assetnotes Security Research team☆180Updated 2 years ago
- Upload files done during my research.☆168Updated 3 weeks ago
- ☆237Updated last year
- A Go-based Exploit Framework☆401Updated this week
- Archive of Potential Insider Threats☆153Updated 2 years ago
- Source Code Management Attack Toolkit☆225Updated 3 years ago
- A rapid HTTP downgrade smuggling scanner written in Go.☆310Updated last year
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆138Updated 2 months ago
- ☆197Updated 2 years ago
- An Interface for AI built for cybersecurity professionals☆93Updated 10 months ago
- A GraphQL enumeration and extraction tool☆133Updated 2 years ago
- Build your own reconnaissance system with Osmedeus Next Generation☆199Updated 4 months ago
- PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is …☆222Updated 2 years ago