gmatuz / inthewilddbLinks
Hourly updated database of exploit and exploitation reports
☆258Updated 6 months ago
Alternatives and similar repositories for inthewilddb
Users that are interested in inthewilddb are comparing it to the libraries listed below
Sorting:
- Find CVE PoCs on GitHub☆148Updated last week
- A source code static analysis platform for AppSec enthusiasts.☆255Updated 5 months ago
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆137Updated this week
- PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is …☆208Updated last year
- Nuclei templates for honeypots detection.☆197Updated last year
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆144Updated 2 years ago
- Zero-dollar attack surface management tool☆295Updated last year
- Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator☆170Updated 3 years ago
- Tool to discover external and internal network attack surface☆200Updated last year
- PoC_CVEs☆162Updated last month
- ☆191Updated 2 years ago
- Secrets scanner that understands code☆149Updated 5 months ago
- A Go-based Exploit Framework☆351Updated this week
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆272Updated 4 months ago
- Tool for searching Exploits from Exploit Databases, etc.☆287Updated 3 weeks ago
- ☆237Updated last year
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆99Updated 2 weeks ago
- First iteration of ML based Feedback WAF☆59Updated last year
- Trends Website (URL) from Twitter hackers.☆98Updated this week
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year
- Divide full port scan results and use it for targeted Nmap runs☆324Updated last year
- Archive of Potential Insider Threats☆148Updated last year
- A blazing fast and fully configurable Blind SQL Injection optimization and automation framework.☆138Updated 2 months ago
- A suite for hunting suspicious targets, expose domains and phishing discovery☆368Updated last month
- Session Hijacking Visual Exploitation☆202Updated last year
- A simple tool that helps to find assets/domains based on the Google Analytics ID.☆176Updated 6 months ago
- Upload files done during my research.☆164Updated 3 months ago
- The IoT security toolkit to help identify IoT related dashboards and scan them for default passwords and vulnerabilities.☆191Updated 8 months ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆130Updated 9 months ago
- Collection of resources related to phishing☆148Updated 4 years ago