gmatuz / inthewilddbLinks
Hourly updated database of exploit and exploitation reports
☆259Updated last year
Alternatives and similar repositories for inthewilddb
Users that are interested in inthewilddb are comparing it to the libraries listed below
Sorting:
- A source code static analysis platform for AppSec enthusiasts.☆267Updated 2 months ago
- Find CVE PoCs on GitHub☆160Updated 6 months ago
- Zero-dollar attack surface management tool☆315Updated last year
- PoC_CVEs☆169Updated 2 months ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆282Updated 5 months ago
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆140Updated this week
- Tool to discover external and internal network attack surface☆203Updated last year
- Upload files done during my research.☆169Updated 2 months ago
- ☆198Updated 3 years ago
- PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is …☆224Updated 2 years ago
- Nuclei templates for honeypots detection.☆198Updated 2 years ago
- Session Hijacking Visual Exploitation☆210Updated last year
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆105Updated 6 months ago
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆294Updated 5 months ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆165Updated 3 months ago
- A Go-based Exploit Framework☆407Updated this week
- Trends Website (URL) from Twitter hackers.☆112Updated this week
- First iteration of ML based Feedback WAF☆59Updated last year
- Secrets scanner that understands code☆165Updated 2 months ago
- A blazing fast and fully configurable Blind SQL Injection optimization and automation framework.☆141Updated 8 months ago
- ☆238Updated last year
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆142Updated 3 years ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆89Updated last year
- Repository to store exploits created by Assetnotes Security Research team☆180Updated 2 years ago
- A simple tool that helps to find assets/domains based on the Google Analytics ID.☆179Updated last month
- ☆154Updated last month
- Archive of Potential Insider Threats☆153Updated 2 years ago
- Build your own reconnaissance system with Osmedeus Next Generation☆203Updated 3 weeks ago
- A rapid HTTP downgrade smuggling scanner written in Go.☆311Updated last year
- Repository of AI-generated Nuclei templates for public CVEs not yet covered by existing templates, enhancing detection speed and coverage…☆119Updated 4 months ago