gmatuz / inthewilddbLinks
Hourly updated database of exploit and exploitation reports
☆256Updated 5 months ago
Alternatives and similar repositories for inthewilddb
Users that are interested in inthewilddb are comparing it to the libraries listed below
Sorting:
- A source code static analysis platform for AppSec enthusiasts.☆254Updated 4 months ago
- Find CVE PoCs on GitHub☆147Updated last year
- Zero-dollar attack surface management tool☆295Updated last year
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆270Updated 4 months ago
- PoC_CVEs☆163Updated last week
- Tool to discover external and internal network attack surface☆199Updated last year
- Nuclei templates for honeypots detection.☆196Updated last year
- PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is …☆206Updated last year
- ☆293Updated last week
- Session Hijacking Visual Exploitation☆201Updated last year
- Collection of resources related to phishing☆146Updated 4 years ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆144Updated 2 years ago
- Redeye is a tool intended to help you manage your data during a pentest operation☆467Updated 10 months ago
- Upload files done during my research.☆162Updated 3 months ago
- My public notes about offensive security☆156Updated last year
- Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator☆169Updated 3 years ago
- First iteration of ML based Feedback WAF☆59Updated last year
- Watch the latest awesome security talks around the globe☆275Updated 4 months ago
- Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing☆134Updated last year
- Source Code Management Attack Toolkit☆219Updated 2 years ago
- Wordlists handcrafted (and automated) with ♥☆218Updated 4 months ago
- A Go-based Exploit Framework☆343Updated last week
- A rapid HTTP downgrade smuggling scanner written in Go.☆302Updated last year
- A simple tool that helps to find assets/domains based on the Google Analytics ID.☆176Updated 6 months ago
- Search for known vulnerabilities in software using software titles or a CPE 2.3 string☆38Updated last month
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆370Updated last year
- Made your bugbounty subdomains reconnaissance easier with Hunt3r the web application reconnaissance framework☆168Updated 2 years ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆162Updated 8 months ago
- ☆235Updated last year
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆136Updated this week