ra1nb0rn / search_vulnsLinks
Search for known vulnerabilities in software using software titles or a CPE 2.3 string
☆37Updated this week
Alternatives and similar repositories for search_vulns
Users that are interested in search_vulns are comparing it to the libraries listed below
Sorting:
- Prototype of Full Agentic Application Security Testing, FAAST = SAST + DAST + LLM agents☆47Updated last month
- ☆64Updated last month
- Verizon Burp Extensions: AI Suite☆131Updated last month
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆32Updated 3 months ago
- ☆115Updated 2 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- ☆77Updated 3 weeks ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated 8 months ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆35Updated 2 months ago
- ☆27Updated 2 years ago
- A curated list of argument injection vectors☆41Updated 4 months ago
- Nmap script to detect a Microsoft Exchange instance version with OWA enabled.☆82Updated last week
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆27Updated 2 months ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆44Updated last year
- Personal collection of exploits and PoCs across Windows, Linux, and enterprise software.☆50Updated 2 months ago
- FastCVE: A Dockerized CVE search tool with API and CLI support for security vulnerability queries.☆52Updated last week
- NotSoCereal: A Deserialization exploit playground☆52Updated 3 years ago
- ☆19Updated 2 weeks ago
- Make better use of the embedded browser that comes by default with Burp☆42Updated last year
- ☆42Updated 4 months ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆49Updated 2 years ago
- Vulnerable environments paired with ready-to-use Nuclei templates for security testing and learning! 🚀☆92Updated this week
- Determine the running software version of a remote F5 BIG-IP management interface.☆66Updated last year
- Tool for helping in the exploitation of path traversal vulnerabilities in Java web applications☆32Updated 2 years ago
- Some of my rough notes for Docker threat detection☆47Updated last year
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Updated last year
- ☆36Updated last month
- Enumerate AWS permissions and resources.☆69Updated 2 years ago
- Utility for creating ZipSlip archives☆72Updated 2 years ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆20Updated 4 months ago