Vulners signature-base software version detection rules
☆38Nov 9, 2021Updated 4 years ago
Alternatives and similar repositories for detect-rules
Users that are interested in detect-rules are comparing it to the libraries listed below
Sorting:
- Burp scanner plugin based on Vulners.com vulnerability database☆25Jul 10, 2017Updated 8 years ago
- Sorta reverse implementation of ShoVAT - Also includes NMAP banner regex results☆16Dec 28, 2018Updated 7 years ago
- Burp Suite Attack Selector Plugin☆60Nov 23, 2017Updated 8 years ago
- Ruby command-line interface to Burp Suite's REST API☆58Apr 1, 2020Updated 5 years ago
- ☆28Oct 16, 2017Updated 8 years ago
- Collection of scanner checks missing in Burp☆15Apr 22, 2022Updated 3 years ago
- Vulnerability scanner based on vulners.com search API☆887Oct 1, 2025Updated 5 months ago
- ICP Data.☆28Jan 20, 2017Updated 9 years ago
- New On Live Web Vul Scan☆40Nov 14, 2015Updated 10 years ago
- Proof-of-Concept exploit of CVE-2018-19131: Squid Proxy XSS via X.509 Certificate☆19Nov 14, 2018Updated 7 years ago
- A sample IE BHO for logging Internet Explorer's POST data.☆10Dec 29, 2017Updated 8 years ago
- XSS_Filter_Evasion_Cheat_Sheet 中文版☆126May 18, 2014Updated 11 years ago
- How can you track the hunting techniques you come up with?☆13Sep 3, 2017Updated 8 years ago
- DNSDelivery provides delivery and in memory execution of shellcode or .Net assembly using DNS requests delivery channel.☆145Oct 6, 2019Updated 6 years ago
- Web hacking assistance toolkit☆111Sep 19, 2017Updated 8 years ago
- The repository contains three lists. You only need to use one. Global proxy list or proxy list from RU, BU, KZ or proxy list by RU region☆10Updated this week
- A Burp Extension to test applications for vulnerability to the Web Cache Deception attack☆140Feb 18, 2021Updated 5 years ago
- WIP: A set of policies based on Catalyze.io's open sourced and vetted policies for HIPPA compliance.☆13Dec 26, 2014Updated 11 years ago
- 从扫描器结果分离出的一些大公司泛解析ip列表☆60Jun 8, 2017Updated 8 years ago
- Outlook addin Back Door☆11Dec 2, 2015Updated 10 years ago
- Burp and ZAP plugin to analyse Content-Security-Policy headers or generate template CSP configuration from crawling a Website☆141Apr 29, 2020Updated 5 years ago
- My attempt at writing exploit POCs for various CVEs☆16Feb 8, 2020Updated 6 years ago
- Sockstress (CVE-2008-4609) DDoS implementation written in Go☆17Jul 2, 2016Updated 9 years ago
- 一个监控 pastebin 的敏感内容,并发微博的 bot☆15Sep 12, 2017Updated 8 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- ☆12Nov 1, 2022Updated 3 years ago
- DNS代理服务器,可以记录log到数据库中☆85Aug 15, 2017Updated 8 years ago
- PowerShell implementations of path-finding algorithms using graph theory☆79Feb 17, 2016Updated 10 years ago
- # Full overview of current vulnerability, exploit , fuzz, mitigation of current major Operation System(Windows, macOS, Linux, Android,iOS…☆53Jul 5, 2017Updated 8 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆120Nov 6, 2024Updated last year
- CVE-2017-13089☆55Nov 15, 2017Updated 8 years ago
- This repo contains code of JScript .NET which can be used as alternative to csc.exe to run potentially malicious code, which ships in all…☆13Nov 8, 2019Updated 6 years ago
- ☆16Feb 26, 2018Updated 8 years ago
- Honeybadger Red Edition☆13Sep 13, 2017Updated 8 years ago
- 一个半自动化命令注入漏洞Fuzz工具(One Semi-automation command injection vulnerability Fuzz tool)☆92Sep 28, 2017Updated 8 years ago
- Using osquery for Mass Incident Detection & Response☆19Jun 25, 2016Updated 9 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Aug 4, 2016Updated 9 years ago
- spring mvc cve-2014-3625☆32Mar 11, 2016Updated 10 years ago
- ☆22Oct 13, 2017Updated 8 years ago