hannob / vulns
Named vulnerabilities and their practical impact
☆433Updated 3 years ago
Alternatives and similar repositories for vulns:
Users that are interested in vulns are comparing it to the libraries listed below
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- ☆251Updated 4 years ago
- New TLS Padding Oracles☆124Updated last year
- Cure53 Browser Security White Paper☆288Updated 7 years ago
- An open source intelligence tool to crawl the graph of certificate Alternate Names☆346Updated last year
- Private keys that have become public ...☆173Updated this week
- TLS - what can go wrong?☆100Updated 6 years ago
- Detection script for the ROBOT vulnerability☆268Updated 2 years ago
- Testing/collecting some container breakouts☆93Updated 5 years ago
- Various Tools and Docker Images☆279Updated 6 years ago
- ☆351Updated 3 years ago
- X41 Browser Security White Paper - Tools and PoCs☆184Updated 7 years ago
- collection of verified Linux kernel exploits☆186Updated 4 years ago
- A collection of scripts that help handling X.509 certificate and TLS issues☆127Updated last week
- A project designed to parse public source code repositories and find various types of vulnerabilities.☆191Updated 7 years ago
- ☆140Updated 8 years ago
- TLS Redirection☆120Updated 7 years ago
- A medium interaction printer honeypot 🍯☆202Updated last year
- An OSINT tool that discovers sub-domains by searching Certificate Transparency logs☆469Updated 2 years ago
- Tools for auditing WAFS☆457Updated 4 years ago
- HonSSH is designed to log all SSH communications between a client and server.☆373Updated 3 years ago
- Detect silent (unwanted) changes to files on your system☆159Updated 4 years ago
- CTFs, solutions and presentations☆285Updated 3 months ago
- Small CTF challenges running on Docker☆157Updated 6 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆535Updated 11 months ago
- ☆267Updated last year
- Code + documentation for the public GreyNoise API☆314Updated 3 years ago
- $50 Million CTF from Hackerone - Writeup☆588Updated 5 years ago
- a grep -r for secrets☆176Updated 2 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆491Updated 3 years ago