gmatuz / inthewilddbLinks
Hourly updated database of exploit and exploitation reports
☆253Updated 4 months ago
Alternatives and similar repositories for inthewilddb
Users that are interested in inthewilddb are comparing it to the libraries listed below
Sorting:
- A source code static analysis platform for AppSec enthusiasts.☆250Updated 3 months ago
- Find CVE PoCs on GitHub☆148Updated last year
- Black box fuzzer for web applications☆426Updated 11 months ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆261Updated 2 months ago
- A Go-based Exploit Framework☆342Updated this week
- A rapid HTTP downgrade smuggling scanner written in Go.☆255Updated last year
- Zero-dollar attack surface management tool☆288Updated last year
- A suite for hunting suspicious targets, expose domains and phishing discovery☆359Updated last month
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆132Updated this week
- Curated list of open-source & paid Attack Surface Monitoring (ASM) tools.☆402Updated 7 months ago
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆69Updated last year
- Search for sensitive data in Postman public library.☆205Updated 5 months ago
- Nuclei templates for honeypots detection.☆194Updated last year
- Session Hijacking Visual Exploitation☆200Updated last year
- A Security Tool for Enumerating WebSockets☆349Updated 3 years ago
- Weekly updated list of missing CVEs in nuclei templates official repository. Mainly built for bug bounty, but useful for penetration test…☆384Updated this week
- ☆293Updated 10 months ago
- Tool for searching Exploits from Exploit Databases, etc.☆282Updated last week
- VULNRΞPO - Free vulnerability report generator and repository, end-to-end encrypted! Templates of issues, CWE,CVE,MITRE ATT&CK,PCI DSS, i…☆492Updated this week
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆417Updated 4 months ago
- Source Code Management Attack Toolkit☆219Updated 2 years ago
- mx-takeover focuses DNS MX records and detects misconfigured MX records.☆347Updated last year
- Vulnerability assessment and penetration testing automation and reporting platform for teams.☆456Updated this week
- A RedTeam Toolkit☆398Updated 2 months ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆141Updated 2 years ago
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆341Updated last year
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆161Updated 6 months ago
- Nuclei documentation☆83Updated last year
- Nuclei AI - Browser Extension for Rapid Nuclei Template Generation☆515Updated 5 months ago
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆356Updated 3 weeks ago