gmatuz / inthewilddbLinks
Hourly updated database of exploit and exploitation reports
☆257Updated 9 months ago
Alternatives and similar repositories for inthewilddb
Users that are interested in inthewilddb are comparing it to the libraries listed below
Sorting:
- A source code static analysis platform for AppSec enthusiasts.☆263Updated 9 months ago
- Find CVE PoCs on GitHub☆155Updated 3 months ago
- Zero-dollar attack surface management tool☆306Updated last year
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆136Updated this week
- Nuclei templates for honeypots detection.☆196Updated 2 years ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆280Updated 2 months ago
- A Go-based Exploit Framework☆383Updated this week
- Tool to discover external and internal network attack surface☆204Updated last year
- Session Hijacking Visual Exploitation☆210Updated last year
- Redeye is a tool intended to help you manage your data during a pentest operation☆469Updated last year
- PoC_CVEs☆166Updated this week
- Collection of resources related to phishing☆158Updated 4 years ago
- A simple tool that helps to find assets/domains based on the Google Analytics ID.☆178Updated 10 months ago
- PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is …☆220Updated last year
- Trends Website (URL) from Twitter hackers.☆107Updated this week
- Upload files done during my research.☆166Updated 7 months ago
- ☆238Updated last year
- Secrets scanner that understands code☆159Updated 3 weeks ago
- 🔑 Authz0 is an automated authorization test tool. Unauthorized access can be identified based on URLs and Roles & Credentials.☆424Updated 2 months ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆143Updated 2 years ago
- ☆314Updated 4 months ago
- First iteration of ML based Feedback WAF☆59Updated last year
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆137Updated last month
- A suite for hunting suspicious targets, expose domains and phishing discovery☆372Updated 2 months ago
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆289Updated 2 months ago
- Source Code Management Attack Toolkit☆225Updated 3 years ago
- Archive of Potential Insider Threats☆152Updated 2 years ago
- Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator☆168Updated 4 years ago
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆186Updated last year
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆393Updated 6 months ago