gmatuz / inthewilddbLinks
Hourly updated database of exploit and exploitation reports
☆255Updated 9 months ago
Alternatives and similar repositories for inthewilddb
Users that are interested in inthewilddb are comparing it to the libraries listed below
Sorting:
- Find CVE PoCs on GitHub☆153Updated 2 months ago
- A source code static analysis platform for AppSec enthusiasts.☆262Updated 8 months ago
- Zero-dollar attack surface management tool☆301Updated last year
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆135Updated this week
- Tool to discover external and internal network attack surface☆203Updated last year
- First iteration of ML based Feedback WAF☆59Updated last year
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆143Updated 2 years ago
- Nuclei templates for honeypots detection.☆196Updated last year
- ☆195Updated 2 years ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆280Updated last month
- ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offen…☆217Updated 5 months ago
- PoC_CVEs☆163Updated last week
- Secrets scanner that understands code☆158Updated 8 months ago
- A blazing fast and fully configurable Blind SQL Injection optimization and automation framework.☆138Updated 4 months ago
- A Go-based Exploit Framework☆367Updated this week
- Divide full port scan results and use it for targeted Nmap runs☆328Updated last year
- Session Hijacking Visual Exploitation☆208Updated last year
- Upload files done during my research.☆166Updated 6 months ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆163Updated 2 weeks ago
- Tool for searching Exploits from Exploit Databases, etc.☆290Updated 3 weeks ago
- Trends Website (URL) from Twitter hackers.☆106Updated this week
- Redeye is a tool intended to help you manage your data during a pentest operation☆470Updated last year
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆104Updated 3 months ago
- Archive of Potential Insider Threats☆151Updated 2 years ago
- Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator☆168Updated 4 years ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆89Updated last year
- PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is …☆219Updated last year
- ☆236Updated last year
- ☆313Updated 3 months ago
- Source Code Management Attack Toolkit☆223Updated 3 years ago