gmatuz / inthewilddbLinks
Hourly updated database of exploit and exploitation reports
☆254Updated 5 months ago
Alternatives and similar repositories for inthewilddb
Users that are interested in inthewilddb are comparing it to the libraries listed below
Sorting:
- A source code static analysis platform for AppSec enthusiasts.☆252Updated 4 months ago
- Find CVE PoCs on GitHub☆147Updated last year
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆261Updated 3 months ago
- A Go-based Exploit Framework☆342Updated this week
- Session Hijacking Visual Exploitation☆200Updated last year
- Black box fuzzer for web applications☆427Updated 11 months ago
- Zero-dollar attack surface management tool☆292Updated last year
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆134Updated this week
- A library for detecting known secrets across many web frameworks☆651Updated last week
- ☆293Updated 10 months ago
- Source Code Management Attack Toolkit☆219Updated 2 years ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆143Updated 2 years ago
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆71Updated last year
- Weekly updated list of missing CVEs in nuclei templates official repository. Mainly built for bug bounty, but useful for penetration test…☆387Updated this week
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆358Updated last month
- A rapid HTTP downgrade smuggling scanner written in Go.☆299Updated last year
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆342Updated last year
- API Security Project aims to present unique attack & defense methods in API Security field☆285Updated 3 years ago
- Redeye is a tool intended to help you manage your data during a pentest operation☆466Updated 10 months ago
- Detailed information about API key / OAuth token (Description, Request, Response, Regex, Example)☆276Updated last year
- Archive of Potential Insider Threats☆146Updated last year
- Kubernetes exploitation tool☆360Updated 11 months ago
- Kraken, a modular multi-language webshell coded by @secu_x11☆544Updated last year
- A collection of offensive Go packages inspired by different Go repositories.☆242Updated 7 months ago
- A proof-of-concept WordPress plugin fuzzer☆192Updated 9 months ago
- A suite for hunting suspicious targets, expose domains and phishing discovery☆361Updated 2 weeks ago
- Curated list of open-source & paid Attack Surface Monitoring (ASM) tools.☆415Updated 8 months ago
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆160Updated 6 months ago
- Smart context-based SSRF vulnerability scanner.☆352Updated 3 years ago
- The Most Advanced Client-Side Prototype Pollution Scanner☆224Updated last week