trickest / find-gh-pocLinks
Find CVE PoCs on GitHub
☆157Updated 5 months ago
Alternatives and similar repositories for find-gh-poc
Users that are interested in find-gh-poc are comparing it to the libraries listed below
Sorting:
- A GraphQL enumeration and extraction tool☆134Updated 2 years ago
- Community Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your own☆76Updated this week
- An extension to use Semgrep inside Burp Suite.☆89Updated 7 months ago
- Improve automated and semi-automated active scanning in Burp Pro☆64Updated 7 months ago
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆186Updated 2 years ago
- Recurrent Neural Network SubDomain Discovery Tool☆95Updated 3 years ago
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆190Updated 3 years ago
- A Burp Suite Extension for Application Penetration Testing to map flows and vulnerabilities☆119Updated 2 years ago
- Burp Extension to add additional functionality for pentesting websocket based applications☆103Updated 4 months ago
- A simple tool that helps to find assets/domains based on the Google Analytics ID.☆179Updated last week
- Workshop given at Hack in Paris 2019☆126Updated 2 years ago
- A source code static analysis platform for AppSec enthusiasts.☆265Updated last month
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆175Updated last year
- List all public repositories for (valid) GitHub usernames☆76Updated 2 years ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆281Updated 4 months ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆35Updated 10 months ago
- Build your own reconnaissance system with Osmedeus Next Generation☆200Updated this week
- Execute Trickest workflows right from your terminal☆95Updated last month
- Repository to store exploits created by Assetnotes Security Research team☆180Updated 2 years ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆165Updated 2 months ago
- Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.☆112Updated 3 years ago
- A list of threat sinks used in the manual security source code review for application security☆74Updated 2 years ago
- A simple remote scanner for Atlassian Jira☆121Updated 2 years ago
- A blazing fast and fully configurable Blind SQL Injection optimization and automation framework.☆139Updated 7 months ago
- 🔭 Collection of regexp pattern for security passive scanning☆115Updated 2 years ago
- FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily bui…☆173Updated 3 years ago
- ☆170Updated 4 years ago
- Run all your bug bounty VPN profiles in parallel and expose them via multiple local SOCKS proxies.☆113Updated 4 years ago
- ☆73Updated 4 years ago
- ☆110Updated last year