gmatuz / inthewilddbLinks
Hourly updated database of exploit and exploitation reports
☆260Updated 7 months ago
Alternatives and similar repositories for inthewilddb
Users that are interested in inthewilddb are comparing it to the libraries listed below
Sorting:
- A source code static analysis platform for AppSec enthusiasts.☆257Updated 6 months ago
- Find CVE PoCs on GitHub☆151Updated 3 weeks ago
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆137Updated this week
- Tool to discover external and internal network attack surface☆203Updated last year
- Nuclei templates for honeypots detection.☆197Updated last year
- Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator☆170Updated 3 years ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆144Updated 2 years ago
- Source Code Management Attack Toolkit☆221Updated 2 years ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆274Updated 5 months ago
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆104Updated last month
- Collection of resources related to phishing☆149Updated 4 years ago
- PoC_CVEs☆163Updated last month
- Redeye is a tool intended to help you manage your data during a pentest operation☆467Updated last year
- Secrets scanner that understands code☆149Updated 6 months ago
- PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is …☆211Updated last year
- My public notes about offensive security☆164Updated last year
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆131Updated 10 months ago
- Trends Website (URL) from Twitter hackers.☆99Updated this week
- First iteration of ML based Feedback WAF☆59Updated last year
- Divide full port scan results and use it for targeted Nmap runs☆326Updated last year
- ☆236Updated last year
- Upload files done during my research.☆164Updated 4 months ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆269Updated 2 years ago
- Web application with vulnerabilities found in real cases, both in pentests and in Bug Bounty programs.☆168Updated last year
- ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offen…☆211Updated 3 months ago
- Zero-dollar attack surface management tool☆296Updated last year
- ☆191Updated 2 years ago
- A collection of offensive Go packages inspired by different Go repositories.☆246Updated 9 months ago
- Awesome Privilege Escalation☆120Updated 2 years ago
- Session Hijacking Visual Exploitation☆203Updated last year