ra1nb0rn / search_vulnsLinks
A modular tool to search for known vulnerabilities, exploits and more across various data sources
☆75Updated this week
Alternatives and similar repositories for search_vulns
Users that are interested in search_vulns are comparing it to the libraries listed below
Sorting:
- ☆116Updated 2 years ago
- LLM-based automated patch diffing☆90Updated 4 months ago
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆116Updated 2 years ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆46Updated 2 years ago
- ☆27Updated 2 years ago
- Verizon Burp Extensions: AI Suite☆142Updated 9 months ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆140Updated 3 months ago
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Updated 2 years ago
- 💎 Vulnerability assessment and vulnerability intelligence tool searching for vulnerabilities and exploits using keywords across multiple…☆36Updated 2 months ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- ☆73Updated last year
- ☆94Updated last month
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆126Updated last year
- Proof Of Concepts☆55Updated 3 weeks ago
- C2 Automation using Linode☆85Updated 3 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆60Updated 2 years ago
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆50Updated 2 years ago
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆189Updated last month
- Unicode Security Toolkit☆40Updated last year
- An automated security testing platform that uses Large Language Models (LLMs) to autonomously solve CTF challenges and penetration testin…☆192Updated this week
- Dumps Salesforce objects if provided with credentials.☆24Updated 5 months ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆45Updated 7 months ago
- Upload files done during my research.☆169Updated last month
- Prototype of Full Agentic Application Security Testing, FAAST = SAST + DAST + LLM agents☆67Updated 8 months ago
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆72Updated 3 months ago
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆114Updated 5 months ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆64Updated last year
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated last year
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆105Updated 6 months ago