hannob / vulns
Named vulnerabilities and their practical impact
☆434Updated 3 years ago
Alternatives and similar repositories for vulns:
Users that are interested in vulns are comparing it to the libraries listed below
- An open source intelligence tool to crawl the graph of certificate Alternate Names☆350Updated last year
- ☆252Updated 4 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- A project designed to parse public source code repositories and find various types of vulnerabilities.☆192Updated 7 years ago
- New TLS Padding Oracles☆125Updated last year
- Detection script for the ROBOT vulnerability☆271Updated 2 years ago
- Private keys that have become public ...☆175Updated last week
- ☆269Updated 2 years ago
- Yar is a tool for plunderin' organizations, users and/or repositories.☆237Updated 4 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆495Updated 3 years ago
- This repo contains logstash of various honeypots☆174Updated 5 years ago
- Code Review Audit Script Scanner☆140Updated last year
- ☆234Updated 6 years ago
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆262Updated 7 years ago
- TLS Redirection☆120Updated 7 years ago
- ☆352Updated 3 years ago
- Neet - Network Enumeration and Exploitation Tool☆167Updated 8 years ago
- A medium interaction printer honeypot 🍯☆202Updated last year
- Various Tools and Docker Images☆280Updated 6 years ago
- DNS Rebinding Exploitation Framework☆489Updated 3 years ago
- A testing framework for mail security and filtering solutions.☆244Updated last year
- Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats…☆492Updated 5 months ago
- A collection of useful Serverless functions I use when pentesting☆384Updated 2 years ago
- INACTIVE - Collection of Tools & Procedures for double checking GitHub configurations☆138Updated 11 months ago
- Cure53 Browser Security White Paper☆294Updated 7 years ago
- Generate vulnerable virtual machines on the fly (current team development is taking place in the cliffe/SecGen fork)☆315Updated 6 years ago
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆166Updated 7 years ago
- ☆142Updated 8 years ago
- Local Privilege Escalation☆207Updated 8 years ago
- DEPRECATED - A prototype SSH configuration and policy scanner (Blog: https://mozilla.github.io/ssh_scan/)☆789Updated 3 years ago