ra1nb0rn / search_vulnsLinks
Search for known vulnerabilities in software using software titles or a CPE 2.3 string
☆43Updated 2 weeks ago
Alternatives and similar repositories for search_vulns
Users that are interested in search_vulns are comparing it to the libraries listed below
Sorting:
- ☆116Updated 2 years ago
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆70Updated 11 months ago
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆189Updated 7 months ago
- 💎 Vulnerability assessment and vulnerability intelligence tool searching for vulnerabilities and exploits using keywords across multiple…☆36Updated 9 months ago
- ☆87Updated 2 weeks ago
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆140Updated this week
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆111Updated 2 years ago
- Upload files done during my research.☆166Updated 6 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated last year
- A blazing fast and fully configurable Blind SQL Injection optimization and automation framework.☆138Updated 4 months ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆45Updated last year
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆65Updated 11 months ago
- Verizon Burp Extensions: AI Suite☆141Updated 6 months ago
- ☆49Updated 8 months ago
- Citrix Scanner for CVE-2023-3519☆51Updated 2 years ago
- C2 Automation using Linode☆85Updated 3 years ago
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆96Updated 2 months ago
- LLM-based automated patch diffing☆81Updated last month
- Some of my rough notes for Docker threat detection☆47Updated 2 years ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆135Updated 2 weeks ago
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆62Updated 6 months ago
- ☆27Updated 2 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆41Updated 4 months ago
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Updated 2 years ago
- Dumps Salesforce objects if provided with credentials.☆18Updated 3 months ago
- https://lolad-project.github.io/☆81Updated 9 months ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆144Updated 2 years ago
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆48Updated 6 months ago
- Prototype of Full Agentic Application Security Testing, FAAST = SAST + DAST + LLM agents☆64Updated 6 months ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆61Updated last year