trickest / find-gh-poc
Find CVE PoCs on GitHub
☆147Updated last year
Alternatives and similar repositories for find-gh-poc:
Users that are interested in find-gh-poc are comparing it to the libraries listed below
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆261Updated last month
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆183Updated 2 years ago
- Source Code Management Attack Toolkit☆215Updated 2 years ago
- A rapid HTTP downgrade smuggling scanner written in Go.☆254Updated 11 months ago
- Vulnerable environments paired with ready-to-use Nuclei templates for security testing and learning! 🚀☆85Updated 3 weeks ago
- oauth-labs: an intentionally vulnerable set of OAuth 2.0 labs for security training and learning☆68Updated 4 months ago
- A GraphQL enumeration and extraction tool☆131Updated 2 years ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆157Updated 5 months ago
- Community Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your own☆71Updated last year
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆179Updated last year
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆173Updated 6 months ago
- Recurrent Neural Network SubDomain Discovery Tool☆95Updated 2 years ago
- ☆75Updated 9 months ago
- An extension to use Semgrep inside Burp Suite.☆88Updated last year
- Burp Extension to add additional functionality for pentesting websocket based applications☆93Updated 10 months ago
- Execute Trickest workflows right from your terminal☆91Updated last week
- A source code static analysis platform for AppSec enthusiasts.☆242Updated 2 months ago
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- Build your own reconnaissance system with Osmedeus Next Generation☆188Updated this week
- Repository to store exploits created by Assetnotes Security Research team☆177Updated last year
- A Burp Suite Extension for pentester and bug bounty hunters an to maintain checklist, map flows, write test cases and track vulnerabiliti…☆115Updated last year
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆119Updated last year
- ☆76Updated 11 months ago
- 🔭 Collection of regexp pattern for security passive scanning☆115Updated 2 years ago
- Black box fuzzer for web applications☆426Updated 9 months ago
- Improve automated and semi-automated active scanning in Burp Pro☆61Updated 2 years ago
- openrisk is a tool that generates a risk score based on the results of a Nuclei scan.☆168Updated 2 months ago
- Check AWS S3 instances for read/write/delete access☆121Updated 3 years ago
- Repository of CVE found by OCD people☆76Updated 9 months ago
- NotSoCereal: A Deserialization exploit playground☆52Updated 3 years ago