mirak-kimko / VulnerabilitySearcherView external linksLinks
This tool will help you to find CVEs, exploits, or possible 0-Days for a specific technology.
☆16Jun 11, 2024Updated last year
Alternatives and similar repositories for VulnerabilitySearcher
Users that are interested in VulnerabilitySearcher are comparing it to the libraries listed below
Sorting:
- Get 10k subdomains in securitytrails using cookie without apikey.☆36Oct 23, 2025Updated 3 months ago
- ☆16Feb 10, 2020Updated 6 years ago
- Complete proof of concept combining artificial intelligence, machine learning, and thousands of publicly available traffic cameras to pla…☆11Jul 7, 2022Updated 3 years ago
- Resources from Jamal & Giuliana's presentation on reserving bytecode into bounties for Jira and Confluence Plugins [BSides Canberra and K…☆21Nov 7, 2025Updated 3 months ago
- ☆10Sep 24, 2021Updated 4 years ago
- Bug-hunting Automation☆40Jun 11, 2023Updated 2 years ago
- This JavaScript CLI "undeletes' packages that have been removed from the NPM registry☆29Dec 18, 2025Updated last month
- ☆10Mar 11, 2024Updated last year
- ☆14Feb 19, 2023Updated 2 years ago
- ☆10Mar 6, 2023Updated 2 years ago
- ☆12Jul 4, 2024Updated last year
- Extensor is a command-line tool designed to help users quickly gather URLs containing specific file extensions from a given source (e.g.,…☆10Mar 13, 2024Updated last year
- Fixes known BinaryFormatter deserialization vulnerabilities☆12Dec 16, 2019Updated 6 years ago
- This repository is related to specialized books published by the THB team.☆20Aug 13, 2025Updated 6 months ago
- gRPC / gRPC-Web Pentest Practicing Lab☆10Aug 29, 2023Updated 2 years ago
- Generate an adb enabled boot.img for Tolino ereaders☆11May 20, 2023Updated 2 years ago
- Exploring hands-on Cybersecurity techniques with a comprehensive repository covering offensive and defensive tools for home-lab environme…☆20Mar 27, 2024Updated last year
- ☆15Apr 20, 2020Updated 5 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- Apprendre NodeJS ExpressJS MongoDB Mongoose et Sequelize - Backend☆10Sep 7, 2020Updated 5 years ago
- Convert Tolino notes into useful formats☆11Dec 28, 2024Updated last year
- ☆10May 10, 2019Updated 6 years ago
- Lightweight library to generate random Java objects (POJOs, collections, etc) using reflection. Perfect for testing and prototyping☆11Oct 3, 2025Updated 4 months ago
- ☆13Jun 27, 2022Updated 3 years ago
- SSE to Stdio MCP Proxy Server☆18Jun 9, 2025Updated 8 months ago
- Dependency vulnerability auditor for PHP☆14Jun 5, 2023Updated 2 years ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆17Jul 11, 2025Updated 7 months ago
- repo for the ctf challenges☆14Apr 20, 2024Updated last year
- ☆19Jan 13, 2025Updated last year
- MAC Address brute forcing tool, used to bypass MAC based filtering☆16Feb 26, 2022Updated 3 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- A simplex kernel-based keylogger written for fun, not evil.☆16Apr 3, 2018Updated 7 years ago
- Face your fears with this repository :)☆13Jul 3, 2023Updated 2 years ago
- implement a paper in Matlab: Detection of Cyber-attacks to indoor real time localization systems for autonomous robots☆13Dec 21, 2019Updated 6 years ago
- Radamsa fuzzer extension for Burp Suite☆23Jun 25, 2013Updated 12 years ago
- Some of my flag protected writeups☆11Apr 13, 2020Updated 5 years ago
- ☆12Nov 1, 2022Updated 3 years ago
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- MAZAPA Writeups - RedTeam Based Peetrochemical Network for Attack☆12Apr 8, 2024Updated last year