rest-apiREST API backend for Reconmap
Stars: ✭ 48 (-64.71%)
log4jscanwinLog4j Vulnerability Scanner for Windows
Stars: ✭ 142 (+4.41%)
LinuxflawThis repo records all the vulnerabilities of linux software I have reproduced in my local workspace
Stars: ✭ 140 (+2.94%)
Hardware And Firmware Security GuidanceGuidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber
Stars: ✭ 408 (+200%)
Cve Check ToolOriginal Automated CVE Checking Tool
Stars: ✭ 172 (+26.47%)
PoccollectPoc Collected for study and develop
Stars: ✭ 15 (-88.97%)
Cve 2018 20555Social Network Tabs Wordpress Plugin Vulnerability - CVE-2018-20555
Stars: ✭ 78 (-42.65%)
LabsVulnerability Labs for security analysis
Stars: ✭ 1,002 (+636.76%)
CVE-2019-8449CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4
Stars: ✭ 66 (-51.47%)
Vulnerability Data ArchiveWith the hope that someone finds the data useful, we periodically publish an archive of almost all of the non-sensitive vulnerability information in our vulnerability reports database. See also https://github.com/CERTCC/Vulnerability-Data-Archive-Tools
Stars: ✭ 63 (-53.68%)
VfeedThe Correlated CVE Vulnerability And Threat Intelligence Database API
Stars: ✭ 826 (+507.35%)
WpreconWPrecon (WordPress Recon), is a vulnerability recognition tool in CMS Wordpress, developed in Go and with scripts in Lua.
Stars: ✭ 135 (-0.74%)
Detect-CVE-2017-15361-TPMDetects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber
Stars: ✭ 34 (-75%)
vulristicsExtensible framework for analyzing publicly available information about vulnerabilities
Stars: ✭ 46 (-66.18%)
Js Vuln DbA collection of JavaScript engine CVEs with PoCs
Stars: ✭ 2,087 (+1434.56%)
Uxss Db🔪Browser logic vulnerabilities ☠️
Stars: ✭ 565 (+315.44%)
Ossf Cve BenchmarkThe OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebases using a variety of static analysis security testing (SAST) tools and generate reports to evaluate those tools.
Stars: ✭ 71 (-47.79%)
Cve 2017 0065Exploiting Edge's read:// urlhandler
Stars: ✭ 15 (-88.97%)
A Red Teamer DiariesRedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (+180.88%)
PayloadsallthethingsA list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 32,909 (+24097.79%)
advisoriesA collection of my public security advisories.
Stars: ✭ 16 (-88.24%)
VulnogramVulnogram is a tool for creating and editing CVE information in CVE JSON format
Stars: ✭ 103 (-24.26%)
FaradayFaraday introduces a new concept - IPE (Integrated Penetration-Test Environment) a multiuser Penetration test IDE. Designed for distributing, indexing, and analyzing the data generated during a security audit.
Stars: ✭ 3,198 (+2251.47%)
WriteupsThis repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (-55.15%)
vulnerablecodeA free and open vulnerabilities database and the packages they impact. And the tools to aggregate and correlate these vulnerabilities. Sponsored by NLnet https://nlnet.nl/project/vulnerabilitydatabase/ for https://www.aboutcode.org/ Chat at https://gitter.im/aboutcode-org/vulnerablecode Docs at https://vulnerablecode.readthedocs.org/
Stars: ✭ 269 (+97.79%)
VulnixVulnerability (CVE) scanner for Nix/NixOS.
Stars: ✭ 161 (+18.38%)
cve-2016-1764Extraction of iMessage Data via XSS
Stars: ✭ 52 (-61.76%)
nmap-log4shellNmap Log4Shell NSE script for discovery Apache Log4j RCE (CVE-2021-44228)
Stars: ✭ 54 (-60.29%)
PatrowlHearsDataOpen-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds
Stars: ✭ 66 (-51.47%)
vulnerability-dbVulnerability database and package search for sources such as OSV, NVD, GitHub and npm.
Stars: ✭ 36 (-73.53%)
cloudrasp-log4j2一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense.
Stars: ✭ 105 (-22.79%)
exploitsSome of my public exploits
Stars: ✭ 50 (-63.24%)
budgetwarriorPersonal finance manager, command-line interface, in C++
Stars: ✭ 95 (-30.15%)
Tenable.io-SDK-for-PythonTenable.io SDK offers a scalable and safe way to integrate with the Tenable.io platform.
Stars: ✭ 83 (-38.97%)
FreeGenCode source du premier générateur d'Europe de 2016 à 2021. Fermé en 2021 par Lukas et TRH pour raisons personelles.
Stars: ✭ 18 (-86.76%)
ethjs-signerA simple module for signing Ethereum transactions.
Stars: ✭ 27 (-80.15%)
LuciferA Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Stars: ✭ 302 (+122.06%)
WhoEnumMass querying whois records
Stars: ✭ 24 (-82.35%)
nightcallAutomated Enumeration Script for Pentesting
Stars: ✭ 32 (-76.47%)
github-reserved-namesGet a list, or check if a user or organization name is reserved by GitHub
Stars: ✭ 38 (-72.06%)
pwn-pulseExploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)
Stars: ✭ 126 (-7.35%)
AzureAD Autologon BruteBrute force attack tool for Azure AD Autologon/Seamless SSO - Source: https://arstechnica.com/information-technology/2021/09/new-azure-active-directory-password-brute-forcing-flaw-has-no-fix/
Stars: ✭ 90 (-33.82%)
PTEyePhantom eye——A passive business logic vulnerability auditing tool
Stars: ✭ 55 (-59.56%)
docker-sftpSFTP Server for Docker
Stars: ✭ 118 (-13.24%)
rakeredThe open source components from rake.red
Stars: ✭ 28 (-79.41%)
spicescriptA Handy-Dandy Personal Toolkit for Enumeration and a headstart on attacking a machine!
Stars: ✭ 20 (-85.29%)
turing-machineA Python program implementing and exploiting the Minsky Turing machine considered in the paper "Intrinsic Propensity for Vulnerability in Computers? Arbitrary Code Execution in the Universal Turing Machine" as per CVE-2021-32471 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32471)
Stars: ✭ 70 (-48.53%)
TraditionalMitigationTraditional Mitigation in GCC to defend Memory Corruption Vulnerability
Stars: ✭ 16 (-88.24%)
docker-alpine-sshdA lightweight OpenSSH Docker Image built atop Alpine Linux.
Stars: ✭ 108 (-20.59%)
graphw00fgraphw00f is GraphQL Server Engine Fingerprinting utility for software security professionals looking to learn more about what technology is behind a given GraphQL endpoint.
Stars: ✭ 260 (+91.18%)