y-mehta / vulnalertsView external linksLinks
Get new vulnerability alerts daily straight to your slack channel using GitHub Actions.
☆16Jan 15, 2026Updated last month
Alternatives and similar repositories for vulnalerts
Users that are interested in vulnalerts are comparing it to the libraries listed below
Sorting:
- ☆12Jun 16, 2021Updated 4 years ago
- Trigger-only for CVE-2021-29627☆13Apr 12, 2021Updated 4 years ago
- Another MISP module for Python☆18Feb 17, 2020Updated 5 years ago
- A repo for tools, utils, and wrappers that are to small to put in their own repo.☆23Mar 18, 2023Updated 2 years ago
- Lab that will help you to understand how type juggling vulnerability works.☆22Sep 23, 2020Updated 5 years ago
- AWS Security Checks☆40Jan 18, 2018Updated 8 years ago
- ☆27Jul 29, 2024Updated last year
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Mar 25, 2021Updated 4 years ago
- ☆10Apr 20, 2022Updated 3 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Aug 26, 2021Updated 4 years ago
- My Personal Notes of OSEP☆39Jun 1, 2023Updated 2 years ago
- A huge base of icons coins (cryptocurrencies). 1887 icons from 16x16 to 128x28.☆12Apr 17, 2018Updated 7 years ago
- A High-Frequency Market-Making bot for CoinCheck.jp☆11Oct 30, 2017Updated 8 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- At this repo you can find any tools, tricks or templates for general penetration testing assesment☆15Apr 27, 2024Updated last year
- User Guide present in Trezor Suite☆12Jan 8, 2026Updated last month
- This tool provides commandline access for https://www.hackthebox.eu, https://tryhackme.com/ and https://www.vulnhub.com/ machines.☆41Mar 6, 2023Updated 2 years ago
- Bug Bounty Tools☆34Jul 2, 2020Updated 5 years ago
- The (WordPress) website test script can be exploited for Unlimited File Upload via CVE-2020-35489☆31Mar 26, 2024Updated last year
- ☆10Jun 13, 2024Updated last year
- Ansible roles for automated deployement and maintenance of Linux servers, network services and applications.☆10Updated this week
- Get top quality resources from this repo. (Beginner Specific)☆13Jul 18, 2023Updated 2 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Quick Command Cheatsheet, you can import/open directly to you ONE NOTE.☆10Dec 31, 2020Updated 5 years ago
- ☆13Feb 26, 2021Updated 4 years ago
- ☆12Mar 9, 2022Updated 3 years ago
- ☆11Dec 5, 2020Updated 5 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- ☆11May 17, 2023Updated 2 years ago
- client-side prototype pullution vulnerability scanner☆46Aug 23, 2021Updated 4 years ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆42Jul 13, 2023Updated 2 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆45Mar 20, 2017Updated 8 years ago
- Python script for exploiting Werkzeug Debug RCE useful for CTF☆39Feb 18, 2020Updated 5 years ago
- Collection of content discovery wordlists in one wordlist.☆38Jan 18, 2022Updated 4 years ago
- Make better use of the embedded browser that comes by default with Burp☆43Jan 1, 2024Updated 2 years ago
- The Bi-directional Link Extractor.☆53Apr 20, 2017Updated 8 years ago
- ☆11Mar 19, 2019Updated 6 years ago
- Mining Server Detector of Cryptocurrency Pools☆10Jan 5, 2023Updated 3 years ago