Hourly updated database of exploit and exploitation reports
☆259Jan 23, 2025Updated last year
Alternatives and similar repositories for inthewilddb
Users that are interested in inthewilddb are comparing it to the libraries listed below
Sorting:
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆140Updated this week
- ☆49Updated this week
- CISA Known Exploited Vulnerabilities Catalog Enrichment☆19Jun 24, 2024Updated last year
- A repo to conduct vulnerability enrichment.☆738Updated this week
- Gather and update all available and newest CVEs with their PoC.☆7,573Updated this week
- TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things☆720Updated this week
- EPSS & VEDAS Score Aggregator for CVEs☆258Feb 22, 2026Updated last week
- Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.☆24Feb 23, 2026Updated last week
- Stakeholder-Specific Vulnerability Categorization☆175Updated this week
- PatrowlHears - Vulnerability Intelligence Center / Exploits☆166Feb 16, 2026Updated 2 weeks ago
- A blazing fast, highly customizable, modern-day defence tool using (in memory) SQL & REST/gRPC protocols.☆20Mar 13, 2024Updated last year
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- Site fast fuzzing with chorme extension.☆24Feb 4, 2022Updated 4 years ago
- The official exploit for OCS Inventory NG v2.7 Remote Command Execution CVE-2020-14947☆19Jul 2, 2020Updated 5 years ago
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- A PowerShell script to prevent Sysmon from writing its events☆16Apr 23, 2020Updated 5 years ago
- exploit for f5-big-ip RCE cve-2023-46747☆207Oct 20, 2024Updated last year
- ☆30Sep 5, 2025Updated 6 months ago
- Tool for searching Exploits from Exploit Databases, etc.☆298Feb 25, 2026Updated last week
- Unfixed Windows PowerShell Filename Code Execution POC☆41Dec 26, 2023Updated 2 years ago
- Threat Intel Platform for T-POTs☆179Updated this week
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,547Jan 20, 2026Updated last month
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆12Mar 2, 2019Updated 7 years ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,302Feb 25, 2026Updated last week
- CveXplore☆42Sep 12, 2025Updated 5 months ago
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆7,548Feb 27, 2026Updated last week
- openrisk is a tool that generates a risk score based on the results of a Nuclei scan.☆181Dec 22, 2025Updated 2 months ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆236Jun 22, 2023Updated 2 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆16Mar 2, 2023Updated 3 years ago
- ☆13Apr 26, 2016Updated 9 years ago
- DNS traffic indexer and analyzer☆26Oct 7, 2014Updated 11 years ago
- Quickly find differences and similarities in disassembled code☆40Nov 21, 2024Updated last year
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆191Feb 24, 2026Updated last week
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,899Oct 29, 2025Updated 4 months ago
- A Docker container for remote penetration testing.☆139Mar 16, 2021Updated 4 years ago
- Vulnogram is the tool for reserving, managing, and publishing CVEs. Get started at vulnogram.org or deploy Docker edition for full enterp…☆214Updated this week
- A multi-platform fuzzer for poking at userland binaries, network clients and servers☆69Dec 13, 2025Updated 2 months ago
- Kerberoast attack -pure python-☆433Nov 30, 2023Updated 2 years ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Nov 5, 2025Updated 4 months ago