cdCloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities like SQL Injection, Cross-site scripting and other exploitable vulnerabilities.
Stars: ✭ 33 (+50%)
attack-surface-detector-zapThe Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters
Stars: ✭ 52 (+136.36%)
SafilerSafari local file reader
Stars: ✭ 118 (+436.36%)
Js Vuln DbA collection of JavaScript engine CVEs with PoCs
Stars: ✭ 2,087 (+9386.36%)
Fuzz.txtPotentially dangerous files
Stars: ✭ 1,382 (+6181.82%)
AdaptADAPT is a tool that performs automated Penetration Testing for WebApps.
Stars: ✭ 179 (+713.64%)
VulrecVulnerability Recurrence:漏洞复现记录
Stars: ✭ 109 (+395.45%)
ExphubExphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340
Stars: ✭ 3,056 (+13790.91%)
AmonetA bootrom exploit for MediaTek devices
Stars: ✭ 96 (+336.36%)
Burp Retire JsBurp/ZAP/Maven extension that integrate Retire.js repository to find vulnerable Javascript libraries.
Stars: ✭ 157 (+613.64%)
Docx Embeddedhtml InjectionWord 2016 vulnerability allows injecting HTML/JS code into a docx file's embeddedHTML="" tags.
Stars: ✭ 91 (+313.64%)
LinuxflawThis repo records all the vulnerabilities of linux software I have reproduced in my local workspace
Stars: ✭ 140 (+536.36%)
DvhmaDamn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities.
Stars: ✭ 180 (+718.18%)
Spectre Meltdown PocA semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities
Stars: ✭ 127 (+477.27%)
ArissploitArissploit Framework is a simple framework designed to master penetration testing tools. Arissploit Framework offers simple structure, basic CLI, and useful features for learning and developing penetration testing tools.
Stars: ✭ 114 (+418.18%)
Cve Check ToolOriginal Automated CVE Checking Tool
Stars: ✭ 172 (+681.82%)
SsrfmapAutomatic SSRF fuzzer and exploitation tool
Stars: ✭ 1,344 (+6009.09%)
VulnixVulnerability (CVE) scanner for Nix/NixOS.
Stars: ✭ 161 (+631.82%)
Pentest GuidePenetration tests guide based on OWASP including test cases, resources and examples.
Stars: ✭ 1,316 (+5881.82%)
GemsuranceGem vulnerability checker using rubysec/ruby-advisory-db
Stars: ✭ 207 (+840.91%)
Audit Check🛡️ GitHub Action for security audits
Stars: ✭ 90 (+309.09%)
PhpvulnAudit tool to find common vulnerabilities in PHP source code
Stars: ✭ 146 (+563.64%)
JscpwnPoC exploit for CVE-2016-4622
Stars: ✭ 89 (+304.55%)
GvmdGreenbone Vulnerability Manager
Stars: ✭ 140 (+536.36%)
HowtohuntTutorials and Things to Do while Hunting Vulnerability.
Stars: ✭ 2,996 (+13518.18%)
WpreconWPrecon (WordPress Recon), is a vulnerability recognition tool in CMS Wordpress, developed in Go and with scripts in Lua.
Stars: ✭ 135 (+513.64%)
KillshotA Penetration Testing Framework, Information gathering tool & Website Vulnerability Scanner
Stars: ✭ 237 (+977.27%)
HuntrVulnerability Database | huntr.dev
Stars: ✭ 136 (+518.18%)
AvpwnList of real-world threats against endpoint protection software
Stars: ✭ 179 (+713.64%)
FortiscanA high performance FortiGate SSL-VPN vulnerability scanning and exploitation tool.
Stars: ✭ 120 (+445.45%)
XvwaXVWA is intentionally designed with many security flaws and enough technical ground to upskill application security knowledge. This whole idea is to evangelize web application security issues. Do let us know your suggestions for improvement or any more vulnerability you would like to see in XVWA future releases.
Stars: ✭ 1,540 (+6900%)
GodnslogAn exquisite dns&http log server for verify SSRF/XXE/RFI/RCE vulnerability
Stars: ✭ 172 (+681.82%)
DockleContainer Image Linter for Security, Helping build the Best-Practice Docker Image, Easy to start
Stars: ✭ 1,713 (+7686.36%)
FuzzitCLI to integrate continuous fuzzing with Fuzzit
Stars: ✭ 220 (+900%)
AnsvifA Not So Very Intelligent Fuzzer: An advanced fuzzing framework designed to find vulnerabilities in C/C++ code.
Stars: ✭ 107 (+386.36%)
Nonce DisrespectNonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
Stars: ✭ 103 (+368.18%)
gvm-toolsRemote control your Greenbone Community Edition or Greenbone Enterprise Appliance
Stars: ✭ 143 (+550%)
VulscanAdvanced vulnerability scanning with Nmap NSE
Stars: ✭ 2,305 (+10377.27%)
Burp Unauth Checkerburpsuite extension for check unauthorized vulnerability
Stars: ✭ 99 (+350%)
PubVulnerability Notes, PoC Exploits and Write-Ups for security issues disclosed by tintinweb
Stars: ✭ 217 (+886.36%)
Django cve 2019 19844 pocPoC for CVE-2019-19844(https://www.djangoproject.com/weblog/2019/dec/18/security-releases/)
Stars: ✭ 94 (+327.27%)
Zeebsploitweb scanner - exploitation - information gathering
Stars: ✭ 159 (+622.73%)
Securify2Securify v2.0
Stars: ✭ 92 (+318.18%)
AryAry 是一个集成类工具,主要用于调用各种安全工具,从而形成便捷的一键式渗透。
Stars: ✭ 241 (+995.45%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+47404.55%)
MagevulndbList of Magento extensions with known security issues.
Stars: ✭ 152 (+590.91%)
Trackray溯光 (TrackRay) 3 beta⚡渗透测试框架(资产扫描|指纹识别|暴力破解|网页爬虫|端口扫描|漏洞扫描|代码审计|AWVS|NMAP|Metasploit|SQLMap)
Stars: ✭ 1,295 (+5786.36%)
VulnfanaticA Binary Ninja plugin for vulnerability research.
Stars: ✭ 203 (+822.73%)
RvdRobot Vulnerability Database. An archive of robot vulnerabilities and bugs.
Stars: ✭ 87 (+295.45%)
MyriamA vulnerable iOS App with Security Challenges for the Security Researcher inside you.
Stars: ✭ 146 (+563.64%)
cve-2016-1764Extraction of iMessage Data via XSS
Stars: ✭ 52 (+136.36%)
FIDLA sane API for IDA Pro's decompiler. Useful for malware RE and vulnerability research
Stars: ✭ 421 (+1813.64%)
Api FuzzerAPI Fuzzer which allows to fuzz request attributes using common pentesting techniques and lists vulnerabilities
Stars: ✭ 238 (+981.82%)