XssconXSSCon: Simple XSS Scanner tool
Stars: ✭ 118 (-15.71%)
IvaIVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to search for CVEs related to a software product.
Stars: ✭ 49 (-65%)
Pentest GuidePenetration tests guide based on OWASP including test cases, resources and examples.
Stars: ✭ 1,316 (+840%)
NugetdefenseAn MSBuildTask that checks for known vulnerabilities. Inspired by OWASP SafeNuGet.
Stars: ✭ 44 (-68.57%)
Owasp OrizonOwasp Orizon is a source code static analyzer tool designed to spot security issues in Java applications.
Stars: ✭ 130 (-7.14%)
Intrigue CoreDiscover Your Attack Surface!
Stars: ✭ 1,013 (+623.57%)
Docx Embeddedhtml InjectionWord 2016 vulnerability allows injecting HTML/JS code into a docx file's embeddedHTML="" tags.
Stars: ✭ 91 (-35%)
Ripv6Random IPv6 - circumvents restrictive IP address-based filter and blocking rules
Stars: ✭ 10 (-92.86%)
BulwarkAn organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.
Stars: ✭ 113 (-19.29%)
RvdRobot Vulnerability Database. An archive of robot vulnerabilities and bugs.
Stars: ✭ 87 (-37.86%)
NettackerAutomated Penetration Testing Framework
Stars: ✭ 982 (+601.43%)
Audit Check🛡️ GitHub Action for security audits
Stars: ✭ 90 (-35.71%)
BlackwidowA Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.
Stars: ✭ 887 (+533.57%)
PoccollectPoc Collected for study and develop
Stars: ✭ 15 (-89.29%)
JscpwnPoC exploit for CVE-2016-4622
Stars: ✭ 89 (-36.43%)
VulrecVulnerability Recurrence:漏洞复现记录
Stars: ✭ 109 (-22.14%)
Cve 2020 10199 cve 2020 10204CVE-2020-10199、CVE-2020-10204漏洞一键检测工具,图形化界面。CVE-2020-10199 and CVE-2020-10204 Vul Tool with GUI.
Stars: ✭ 20 (-85.71%)
Ble Security Attack Defence✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth LE stacks.
Stars: ✭ 88 (-37.14%)
Vuln Web AppsA curated list of vulnerable web applications.
Stars: ✭ 128 (-8.57%)
ThoronThoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-37.86%)
SecretscannerFind secrets and passwords in container images and file systems
Stars: ✭ 895 (+539.29%)
AnsvifA Not So Very Intelligent Fuzzer: An advanced fuzzing framework designed to find vulnerabilities in C/C++ code.
Stars: ✭ 107 (-23.57%)
In Spectre MeltdownThis tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Stars: ✭ 86 (-38.57%)
AtscanAdvanced dork Search & Mass Exploit Scanner
Stars: ✭ 817 (+483.57%)
MrspickyMrsPicky - An IDAPython decompiler script that helps auditing calls to the memcpy() and memmove() functions.
Stars: ✭ 86 (-38.57%)
OssaOpen-Source Security Architecture | 开源安全架构
Stars: ✭ 796 (+468.57%)
SdwannewhopeSD-WAN security and insecurity
Stars: ✭ 141 (+0.71%)
PerunPerun是一款主要适用于乙方安服、渗透测试人员和甲方RedTeam红队人员的网络资产漏洞扫描器/扫描框架
Stars: ✭ 773 (+452.14%)
Spectre Meltdown PocA semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities
Stars: ✭ 127 (-9.29%)
Bad PdfSteal Net-NTLM Hash using Bad-PDF
Stars: ✭ 748 (+434.29%)
Zeus ScannerAdvanced reconnaissance utility
Stars: ✭ 706 (+404.29%)
Struts ScanPython2编写的struts2漏洞全版本检测和利用工具
Stars: ✭ 1,256 (+797.14%)
Clair ScannerDocker containers vulnerability scan
Stars: ✭ 679 (+385%)
Gda Android Reversing ToolGDA is a new fast and powerful decompiler in C++(working without Java VM) for the APK, DEX, ODEX, OAT, JAR, AAR, and CLASS file. which supports malicious behavior detection, privacy leaking detection, vulnerability detection, path solving, packer identification, variable tracking, deobfuscation, python&java scripts, device memory extraction, dat…
Stars: ✭ 2,332 (+1565.71%)
Vulstudy使用docker快速搭建各大漏洞靶场,目前可以一键搭建17个靶场。
Stars: ✭ 1,245 (+789.29%)
Jok3rJok3r v3 BETA 2 - Network and Web Pentest Automation Framework
Stars: ✭ 645 (+360.71%)
AngelswordPython3编写的CMS漏洞检测框架
Stars: ✭ 1,223 (+773.57%)
JoomscanOWASP Joomla Vulnerability Scanner Project
Stars: ✭ 640 (+357.14%)
SwiftnessA note-taking macOS app for penetration-testers.
Stars: ✭ 124 (-11.43%)
SingularityA DNS rebinding attack framework.
Stars: ✭ 621 (+343.57%)
Cve 2018 20555Social Network Tabs Wordpress Plugin Vulnerability - CVE-2018-20555
Stars: ✭ 78 (-44.29%)
HerpaderpingProcess Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Stars: ✭ 614 (+338.57%)
SeccubusEasy automated vulnerability scanning, reporting and analysis
Stars: ✭ 615 (+339.29%)
UnjailmeA sandbox escape based on the proof-of-concept (CVE-2018-4087) by Rani Idan (Zimperium)
Stars: ✭ 73 (-47.86%)
RobberRobber is open source tool for finding executables prone to DLL hijacking
Stars: ✭ 602 (+330%)
Corscanner Fast CORS misconfiguration vulnerabilities scanner🍻
Stars: ✭ 601 (+329.29%)
Nonce DisrespectNonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
Stars: ✭ 103 (-26.43%)
Hacker ezinesA collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (-48.57%)
Scanners BoxA powerful hacker toolkit collected more than 10 categories of open source scanners from Github - 安全行业从业者自研开源扫描器合辑
Stars: ✭ 5,590 (+3892.86%)
Uxss Db🔪Browser logic vulnerabilities ☠️
Stars: ✭ 565 (+303.57%)