hannob / vulns
Named vulnerabilities and their practical impact
☆432Updated 3 years ago
Alternatives and similar repositories for vulns:
Users that are interested in vulns are comparing it to the libraries listed below
- ☆252Updated 4 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- a grep -r for secrets☆178Updated 2 years ago
- New TLS Padding Oracles☆125Updated last year
- Various Tools and Docker Images☆279Updated 6 years ago
- Tools for auditing WAFS☆458Updated 4 years ago
- Detection script for the ROBOT vulnerability☆268Updated 2 years ago
- An open source intelligence tool to crawl the graph of certificate Alternate Names☆347Updated last year
- collection of verified Linux kernel exploits☆187Updated 4 years ago
- A project designed to parse public source code repositories and find various types of vulnerabilities.☆191Updated 7 years ago
- ☆141Updated 8 years ago
- Neet - Network Enumeration and Exploitation Tool☆167Updated 8 years ago
- TLS - what can go wrong?☆100Updated 6 years ago
- A script that automates generation of OpenSSL reverse shells☆300Updated 4 years ago
- HonSSH is designed to log all SSH communications between a client and server.☆374Updated 3 years ago
- O-Saft - OWASP SSL advanced forensic tool☆377Updated 2 weeks ago
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆262Updated 7 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆493Updated 3 years ago
- Testing/collecting some container breakouts☆93Updated 5 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆538Updated last year
- DNS Rebinding Exploitation Framework☆488Updated 3 years ago
- This repo contains logstash of various honeypots☆174Updated 5 years ago
- The TLS-Scanner Module from TLS-Attacker☆273Updated last month
- Cure53 Browser Security White Paper☆292Updated 7 years ago
- A collection of useful Serverless functions I use when pentesting☆382Updated 2 years ago
- ☆351Updated 3 years ago
- PoC code to extract private keys from Windows 10's built in ssh-agent service☆173Updated 6 years ago
- A testing framework for mail security and filtering solutions.☆244Updated last year
- Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats…☆491Updated 4 months ago
- Small CTF challenges running on Docker☆157Updated 6 years ago