trickest / find-gh-pocLinks
Find CVE PoCs on GitHub
☆153Updated last month
Alternatives and similar repositories for find-gh-poc
Users that are interested in find-gh-poc are comparing it to the libraries listed below
Sorting:
- A GraphQL enumeration and extraction tool☆133Updated 2 years ago
- An extension to use Semgrep inside Burp Suite.☆89Updated 3 months ago
- A source code static analysis platform for AppSec enthusiasts.☆258Updated 6 months ago
- Community Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your own☆75Updated last year
- A Burp Suite Extension for Application Penetration Testing to map flows and vulnerabilities☆120Updated last year
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆274Updated this week
- Improve automated and semi-automated active scanning in Burp Pro☆62Updated 3 months ago
- Repository to store exploits created by Assetnotes Security Research team☆182Updated last year
- Burp Extension to add additional functionality for pentesting websocket based applications☆98Updated 3 weeks ago
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆184Updated last year
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆188Updated 3 years ago
- A simple tool that helps to find assets/domains based on the Google Analytics ID.☆177Updated 8 months ago
- Vulnerable environments paired with ready-to-use Nuclei templates for security testing and learning! 🚀☆111Updated last month
- Recurrent Neural Network SubDomain Discovery Tool☆95Updated 2 years ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆163Updated last week
- FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily bui…☆163Updated 2 years ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆175Updated 10 months ago
- Execute Trickest workflows right from your terminal☆94Updated 3 weeks ago
- A blazing fast and fully configurable Blind SQL Injection optimization and automation framework.☆139Updated 3 months ago
- A rapid HTTP downgrade smuggling scanner written in Go.☆306Updated last year
- Security Advisories☆34Updated 2 months ago
- Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.☆113Updated 3 years ago
- ☆79Updated last year
- ☆71Updated 3 years ago
- A Burp Suite Extension for pentester and bug bounty hunters an to maintain checklist, map flows, write test cases and track vulnerabiliti…☆117Updated 2 years ago
- ☆105Updated last year
- Dependency Confusion Security Testing Tool☆50Updated 3 years ago
- List all public repositories for (valid) GitHub usernames☆76Updated last year
- oauth-labs: an intentionally vulnerable set of OAuth 2.0 labs for security training and learning☆70Updated 9 months ago
- Workshop given at Hack in Paris 2019☆124Updated 2 years ago