gmatuz / inthewilddb
Hourly updated database of exploit and exploitation reports
☆253Updated 3 months ago
Alternatives and similar repositories for inthewilddb
Users that are interested in inthewilddb are comparing it to the libraries listed below
Sorting:
- Find CVE PoCs on GitHub☆147Updated last year
- A source code static analysis platform for AppSec enthusiasts.☆243Updated 2 months ago
- Black box fuzzer for web applications☆426Updated 10 months ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆261Updated 2 months ago
- Weekly updated list of missing CVEs in nuclei templates official repository. Mainly built for bug bounty, but useful for penetration test…☆376Updated this week
- Zero-dollar attack surface management tool☆287Updated last year
- A rapid HTTP downgrade smuggling scanner written in Go.☆255Updated last year
- Detailed information about API key / OAuth token (Description, Request, Response, Regex, Example)☆273Updated last year
- Nuclei templates for honeypots detection.☆194Updated last year
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆340Updated last year
- PoC_CVEs☆162Updated last month
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆131Updated this week
- Smart context-based SSRF vulnerability scanner.☆349Updated 3 years ago
- Discover new target domains using Content Security Policy☆428Updated 3 weeks ago
- A Go-based Exploit Framework☆338Updated this week
- A suite for hunting suspicious targets, expose domains and phishing discovery☆357Updated 3 weeks ago
- A library for detecting known secrets across many web frameworks☆629Updated this week
- Session Hijacking Visual Exploitation☆200Updated last year
- Tool for searching Exploits from Exploit Databases, etc.☆282Updated this week
- A collection of offensive Go packages inspired by different Go repositories.☆242Updated 6 months ago
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆98Updated last year
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆141Updated 2 years ago
- Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploi…☆141Updated last year
- Made your bugbounty subdomains reconnaissance easier with Hunt3r the web application reconnaissance framework☆167Updated 2 years ago
- ☆200Updated last week
- The Most Advanced Client-Side Prototype Pollution Scanner☆221Updated this week
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆158Updated 6 months ago
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆304Updated 5 months ago
- ☆231Updated 10 months ago
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆67Updated last year