Yet Another Vulnerability Database
☆16Jul 23, 2021Updated 4 years ago
Alternatives and similar repositories for yavdb
Users that are interested in yavdb are comparing it to the libraries listed below
Sorting:
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- ☆12Apr 21, 2020Updated 5 years ago
- Radamsa fuzzer extension for Burp Suite☆23Jun 25, 2013Updated 12 years ago
- CVE-2019-18890 POC (Proof of Concept)☆10Jan 6, 2020Updated 6 years ago
- Python Package for burprestapi☆17Dec 27, 2019Updated 6 years ago
- ☆21Nov 30, 2019Updated 6 years ago
- Community rules for Commit Watcher☆24Jun 9, 2016Updated 9 years ago
- A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.☆24Jul 10, 2019Updated 6 years ago
- Code for the DIMVA 2018 paper: "MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps"☆26Jul 22, 2019Updated 6 years ago
- Collection of scripts to Invoke an expression with different credentials.☆35Jun 2, 2021Updated 4 years ago
- Problem sets for the programming blitz at KITE☆31Nov 3, 2017Updated 8 years ago
- Plattform to develop and experiment with existing java web attacks.☆31Jan 8, 2018Updated 8 years ago
- WP-Hunter is a WordPress plugin/theme reconnaissance and static analysis (SAST) tool. It is designed for security researchers to evaluate…☆35Updated this week
- ModbusTCP Fuzzing and DoS Tool.☆11Aug 8, 2020Updated 5 years ago
- ☆10Sep 24, 2021Updated 4 years ago
- Evaluation Framework for Dependency Analysis (EFDA)☆44May 4, 2022Updated 3 years ago
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60May 16, 2019Updated 6 years ago
- This tool will help you to find CVEs, exploits, or possible 0-Days for a specific technology.☆16Jun 11, 2024Updated last year
- ☆10Mar 11, 2024Updated last year
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- ☆14Feb 19, 2023Updated 3 years ago
- ☆12Jul 4, 2024Updated last year
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- A Burp Suite extension that converts IP addresses to decimal notation, useful for SSRF bypass and WAF evasion testing. Created by Harshad…☆11Dec 9, 2024Updated last year
- ☆12Aug 5, 2015Updated 10 years ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Apr 26, 2020Updated 5 years ago
- Animation engine for explanatory math videos☆10Apr 21, 2021Updated 4 years ago
- Tools that run inside the guest☆11Jan 2, 2020Updated 6 years ago
- Compiler Fingerprinting☆14Apr 24, 2015Updated 10 years ago
- OpenAPI's JsonSchema validator.☆12Jan 5, 2023Updated 3 years ago
- POV templates and compilation support for CGC binaries.☆10May 19, 2022Updated 3 years ago
- Mad (╯°□°)╯'ing☆10Nov 22, 2022Updated 3 years ago
- A tool for learning bug patterns.☆11Jul 19, 2016Updated 9 years ago
- Home of https://redteam.guide☆15Sep 19, 2022Updated 3 years ago
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- Dynamic templates and data contexts.☆26Aug 18, 2021Updated 4 years ago
- ☆13Jun 25, 2017Updated 8 years ago
- This repository is related to specialized books published by the THB team.☆20Aug 13, 2025Updated 6 months ago