Hourly updated database of exploit and exploitation reports
☆261Jan 23, 2025Updated last year
Alternatives and similar repositories for inthewilddb
Users that are interested in inthewilddb are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CISA Known Exploited Vulnerabilities Catalog Enrichment☆19Jun 24, 2024Updated last year
- Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.☆25Mar 9, 2026Updated last month
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆144Updated this week
- Tool for searching Exploits from Exploit Databases, etc.☆300Mar 30, 2026Updated 2 weeks ago
- Gather and update all available and newest CVEs with their PoC.☆7,675Updated this week
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A repo to conduct vulnerability enrichment.☆752Updated this week
- Site fast fuzzing with chorme extension.☆24Feb 4, 2022Updated 4 years ago
- CveXplore☆42Mar 26, 2026Updated 2 weeks ago
- Global Security Database☆319Apr 29, 2024Updated last year
- Apache CouchDB 3.2.1 - Remote Code Execution (RCE)☆29May 20, 2022Updated 3 years ago
- TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things☆722Updated this week
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,326Apr 8, 2026Updated last week
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- exploit for f5-big-ip RCE cve-2023-46747☆209Oct 20, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Find CVE PoCs on GitHub☆161Aug 1, 2025Updated 8 months ago
- The official exploit for OCS Inventory NG v2.7 Remote Command Execution CVE-2020-14947☆19Jul 2, 2020Updated 5 years ago
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆7,621Updated this week
- WebPathScanner helps pentester or web developer to find some interesting files( like .htaccess, .htpasswd ..etc) for improving the securi…☆24May 8, 2022Updated 3 years ago
- openrisk is a tool that generates a risk score based on the results of a Nuclei scan.☆181Dec 22, 2025Updated 3 months ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆235Jun 22, 2023Updated 2 years ago
- A blazing fast, highly customizable, modern-day defence tool using (in memory) SQL & REST/gRPC protocols.☆20Mar 13, 2024Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆150Sep 22, 2023Updated 2 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- PatrowlHears - Vulnerability Intelligence Center / Exploits☆167Mar 14, 2026Updated last month
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- Service to scan licenses from source code☆12Aug 14, 2023Updated 2 years ago
- CVE.ICU code.☆51Updated this week
- Vulnogram is the tool for reserving, managing, and publishing CVEs. Get started at vulnogram.org or deploy Docker edition for full enterp…☆218Updated this week
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆195Feb 24, 2026Updated last month
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 5 years ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆87Sep 16, 2025Updated 6 months ago
- The difference between exploitation prediction and detection is akin to the difference between detecting a missile launch or a detonation…☆13Apr 4, 2026Updated last week
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ZAP Website☆20Updated this week
- Apache APISIX Remote Code Execution (CVE-2022-24112) proof of concept exploit☆14Mar 16, 2022Updated 4 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- Severity scoring and exploit categorisation for vulnerability reports using machine-learning tools.☆26May 16, 2023Updated 2 years ago
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,732Mar 21, 2026Updated 3 weeks ago
- XSSMaze is a web service designed to test and improve the performance of security testing tools by providing various cases of XSS vulnera…☆32Mar 31, 2026Updated 2 weeks ago
- AIL framework - Analysis Information Leak framework☆901Updated this week