Get new vulnerability alerts daily straight to your slack channel using GitHub Actions.
☆16Jan 15, 2026Updated last month
Alternatives and similar repositories for vulnalerts
Users that are interested in vulnalerts are comparing it to the libraries listed below
Sorting:
- Module to prevent SSRF when sending requests in NodeJS. Blocks request to local and private IP addresses☆23Jan 22, 2026Updated last month
- Lab that will help you to understand how type juggling vulnerability works.☆22Sep 23, 2020Updated 5 years ago
- AWS Security Checks☆40Jan 18, 2018Updated 8 years ago
- ☆27Jul 29, 2024Updated last year
- Security test tool for Blind XSS☆26Mar 5, 2020Updated 6 years ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Mar 25, 2021Updated 4 years ago
- ☆10Apr 20, 2022Updated 3 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Aug 26, 2021Updated 4 years ago
- My Personal Notes of OSEP☆40Jun 1, 2023Updated 2 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Android app for tracking your locations and uploading them on your private server☆11Jul 1, 2017Updated 8 years ago
- A High-Frequency Market-Making bot for CoinCheck.jp☆10Oct 30, 2017Updated 8 years ago
- A huge base of icons coins (cryptocurrencies). 1887 icons from 16x16 to 128x28.☆12Apr 17, 2018Updated 7 years ago
- ☆10Jul 21, 2021Updated 4 years ago
- User Guide present in Trezor Suite☆12Jan 8, 2026Updated 2 months ago
- At this repo you can find any tools, tricks or templates for general penetration testing assesment☆15Apr 27, 2024Updated last year
- This tool provides commandline access for https://www.hackthebox.eu, https://tryhackme.com/ and https://www.vulnhub.com/ machines.☆42Mar 6, 2023Updated 3 years ago
- Bug Bounty Tools☆34Jul 2, 2020Updated 5 years ago
- ☆11Dec 5, 2020Updated 5 years ago
- Quick Command Cheatsheet, you can import/open directly to you ONE NOTE.☆10Updated this week
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- Get top quality resources from this repo. (Beginner Specific)☆13Jul 18, 2023Updated 2 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- ☆11May 17, 2023Updated 2 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Collection of content discovery wordlists in one wordlist.☆38Jan 18, 2022Updated 4 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- Make better use of the embedded browser that comes by default with Burp☆43Jan 1, 2024Updated 2 years ago
- Python script for exploiting Werkzeug Debug RCE useful for CTF☆39Feb 18, 2020Updated 6 years ago
- Sweetuu is a Advance Shell which can be used to achieve RCE easily through LFI & RFI. For easy wins in bug bounty, upload sweetuu instead…☆10Dec 16, 2024Updated last year
- Browser History Histogram -- module for the Autopsy Forensic Browser☆11Sep 15, 2019Updated 6 years ago
- A python2 script for detecting "Dash" button presses and firing Home-Assistant event triggers☆11Dec 2, 2015Updated 10 years ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- Some python scripts I wrote that help with various specialized AWS security things☆10Jan 15, 2020Updated 6 years ago
- How to create an OS from scratch☆12Jan 22, 2020Updated 6 years ago
- zkSNARK full flow example in Go☆12Jun 3, 2020Updated 5 years ago
- Mining Server Detector of Cryptocurrency Pools☆11Jan 5, 2023Updated 3 years ago
- Fresh and Ape-y NFT Template☆16May 10, 2024Updated last year
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago