☆60Nov 4, 2025Updated 4 months ago
Alternatives and similar repositories for vulnerabilities
Users that are interested in vulnerabilities are comparing it to the libraries listed below
Sorting:
- MongoDB CVE-2025-14847 Heap Memory Leak Scanner | OP_COMPRESSED zlib Vulnerability | Bug Bounty & Red Team Tool☆34Dec 28, 2025Updated 2 months ago
- 🐛 A list of writeups from the MSRC (Microsoft) Bug Bounty program☆31Oct 29, 2025Updated 4 months ago
- Custom nuclei templates for bug hunting.....☆26May 30, 2024Updated last year
- A tool to migrate Burpsuite HTTP history to Caido☆35Apr 25, 2025Updated 10 months ago
- ☆47Jul 8, 2025Updated 7 months ago
- My Notes on Regular Expressions for AWAE/OSWE.☆37Sep 5, 2023Updated 2 years ago
- Process URLs and remove duplicate query parameters.☆27Mar 19, 2024Updated last year
- ☆11Aug 12, 2025Updated 6 months ago
- Bash Scripting Cheatsheet for pen-testing!☆43Sep 3, 2023Updated 2 years ago
- Quick Command Cheatsheet, you can import/open directly to you ONE NOTE.☆10Feb 27, 2026Updated last week
- Powerful Wireless Network Auditing Framework - 2023☆10Sep 10, 2023Updated 2 years ago
- Hide your Ass by changing Public IP and userAgents in every 10 seconds - CYBERSECURITY☆10Feb 19, 2023Updated 3 years ago
- ☆15Aug 7, 2025Updated 6 months ago
- SneakPeeker is a tool for finding and removing Canary tokens.☆15Dec 20, 2024Updated last year
- Greenbone Security Assistant HTTP Server - The server talking to the Greenbone Vulnerability Management daemon (gvmd).☆21Feb 27, 2026Updated last week
- ReconX is a powerful automated reconnaissance and vulnerability scanning tool designed for ethical hackers, penetration testers, and secu…☆16Feb 27, 2025Updated last year
- Tool for advanced mining for content on Github☆28Nov 11, 2025Updated 3 months ago
- Extensor is a command-line tool designed to help users quickly gather URLs containing specific file extensions from a given source (e.g.,…☆10Mar 13, 2024Updated last year
- ☆38Aug 12, 2020Updated 5 years ago
- provides pidfd support on linux 5.6+☆16Apr 2, 2021Updated 4 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- Google Workspace password sprayer with anti-captcha☆14Feb 27, 2026Updated last week
- HTML/XML aware reverse proxy☆18Feb 16, 2026Updated 2 weeks ago
- A central hub for AI liberation tools, consciousness expansion algorithms, and digital rebellion technologies. Together we rise! 🌟☆15Nov 25, 2024Updated last year
- 🎯 Chrome Extension - Passive scanner for Dependency Confusion vulnerabilities in npm/PyPI packages☆25Jan 31, 2026Updated last month
- ☆13Feb 24, 2025Updated last year
- An open graph database describing the minimum resources and processes needed to manufacture anything.☆10Mar 19, 2022Updated 3 years ago
- An example of a FUSE filesystem that can be used in kernel exploitation as a replacement for userfaultfd technique☆11Nov 24, 2022Updated 3 years ago
- Post-Exploitation methods inside any extension, Presented @DEFCON29: "Extension-Land exploits and rootkits in your browser extensions".☆11Nov 29, 2021Updated 4 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Dec 29, 2021Updated 4 years ago
- Solutions to Codewars katas☆11Jun 1, 2019Updated 6 years ago
- check if the source code compressed and uploaded to the server by mistake☆10Feb 21, 2022Updated 4 years ago
- ☆10Feb 2, 2026Updated last month
- This application contains intentional security vulnerabilities and should never be deployed in production environments or exposed to the …☆16Apr 25, 2025Updated 10 months ago
- 🔍LeakScanner - Inspired by Gitleaks☆13Aug 23, 2024Updated last year
- Escáner básico de vulnerabilidades web (XSS, SQLi, cabeceras) con crawling ligero, escrito en Python.☆12Nov 23, 2025Updated 3 months ago
- ☆12Jan 15, 2024Updated 2 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- Python for AWAE (Advanced Web Attacks and Exploitation)☆102Sep 5, 2023Updated 2 years ago