This tool will help you to find CVEs, exploits, or possible 0-Days for a specific technology.
☆16Jun 11, 2024Updated last year
Alternatives and similar repositories for VulnerabilitySearcher
Users that are interested in VulnerabilitySearcher are comparing it to the libraries listed below
Sorting:
- Get 10k subdomains in securitytrails using cookie without apikey.☆36Oct 23, 2025Updated 4 months ago
- ☆16Feb 10, 2020Updated 6 years ago
- Resources from Jamal & Giuliana's presentation on reserving bytecode into bounties for Jira and Confluence Plugins [BSides Canberra and K…☆22Nov 7, 2025Updated 3 months ago
- ☆10Sep 24, 2021Updated 4 years ago
- Complete proof of concept combining artificial intelligence, machine learning, and thousands of publicly available traffic cameras to pla…☆11Jul 7, 2022Updated 3 years ago
- Bug-hunting Automation☆39Jun 11, 2023Updated 2 years ago
- Extensor is a command-line tool designed to help users quickly gather URLs containing specific file extensions from a given source (e.g.,…☆10Mar 13, 2024Updated last year
- This JavaScript CLI "undeletes' packages that have been removed from the NPM registry☆29Dec 18, 2025Updated 2 months ago
- ☆12Jul 4, 2024Updated last year
- ☆10Mar 11, 2024Updated last year
- ☆10Mar 6, 2023Updated 3 years ago
- ☆14Feb 19, 2023Updated 3 years ago
- ☆15Apr 20, 2020Updated 5 years ago
- ☆10May 10, 2019Updated 6 years ago
- Lightweight library to generate random Java objects (POJOs, collections, etc) using reflection. Perfect for testing and prototyping☆11Oct 3, 2025Updated 5 months ago
- Generate an adb enabled boot.img for Tolino ereaders☆10May 20, 2023Updated 2 years ago
- Fixes known BinaryFormatter deserialization vulnerabilities☆12Dec 16, 2019Updated 6 years ago
- Apprendre NodeJS ExpressJS MongoDB Mongoose et Sequelize - Backend☆10Sep 7, 2020Updated 5 years ago
- This repository is related to specialized books published by the THB team.☆20Aug 13, 2025Updated 6 months ago
- gRPC / gRPC-Web Pentest Practicing Lab☆10Aug 29, 2023Updated 2 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- Convert Tolino notes into useful formats☆11Dec 28, 2024Updated last year
- Exploring hands-on Cybersecurity techniques with a comprehensive repository covering offensive and defensive tools for home-lab environme…☆20Mar 27, 2024Updated last year
- ☆14Jun 27, 2022Updated 3 years ago
- Home of https://redteam.guide☆15Sep 19, 2022Updated 3 years ago
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆17Jul 11, 2025Updated 7 months ago
- Dependency vulnerability auditor for PHP☆14Jun 5, 2023Updated 2 years ago
- Face your fears with this repository :)☆13Jul 3, 2023Updated 2 years ago
- SSE to Stdio MCP Proxy Server☆19Feb 17, 2026Updated 2 weeks ago
- LLM agent solving traces, leaderboards, and benchmark results across security CTF and hacking platforms☆48Updated this week
- Docker container with Apache 2 / CGI shellshock vulnerable.☆12Dec 18, 2017Updated 8 years ago
- Deploying of infrastructure and technologies for a SOC as a Service ( SOCasS)☆14Apr 10, 2020Updated 5 years ago
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- A demonstration of OWASP 2017 Top 10 and .NET Core☆11Mar 17, 2023Updated 2 years ago
- ☆19Jan 13, 2025Updated last year
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- repo for the ctf challenges☆14Apr 20, 2024Updated last year
- ALFASVMLib - A Matlab library for adversarial label flip attacks against SVMs☆13Jun 19, 2015Updated 10 years ago