ra1nb0rn / search_vulnsLinks
Search for known vulnerabilities in software using software titles or a CPE 2.3 string
☆39Updated 2 weeks ago
Alternatives and similar repositories for search_vulns
Users that are interested in search_vulns are comparing it to the libraries listed below
Sorting:
- ☆116Updated 2 years ago
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆90Updated last month
- ☆84Updated last month
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆45Updated last year
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆71Updated this week
- Verizon Burp Extensions: AI Suite☆138Updated 4 months ago
- Personal collection of exploits and PoCs across Windows, Linux, and enterprise software.☆50Updated last month
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆67Updated 9 months ago
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆108Updated 2 years ago
- Some of my rough notes for Docker threat detection☆47Updated 2 years ago
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆189Updated 6 months ago
- This repository contains the pre-joining training materials given to aspiring researchers on the Vulnerability Researcher Development Pro…☆79Updated last month
- Prototype of Full Agentic Application Security Testing, FAAST = SAST + DAST + LLM agents☆63Updated 4 months ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆40Updated 2 months ago
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆64Updated 9 months ago
- https://lolad-project.github.io/☆81Updated 8 months ago
- Simple PoC for demonstrating Race Conditions on Websockets☆55Updated 2 years ago
- 💎 Vulnerability assessment and vulnerability intelligence tool searching for vulnerabilities and exploits using keywords across multiple…☆36Updated 7 months ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆131Updated 10 months ago
- ☆54Updated 7 months ago
- Upload files done during my research.☆165Updated 5 months ago
- ☆59Updated last year
- ☆47Updated 7 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆65Updated last year
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 3 years ago
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Updated 2 years ago
- C2 Automation using Linode☆84Updated 2 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆61Updated last year
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆104Updated last month
- ☆13Updated 5 months ago