All Projects → Securityexploits → Similar Projects or Alternatives

221 Open source projects that are alternatives of or similar to Securityexploits

Poc Exploits
Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.
Stars: ✭ 111 (-53.56%)
Mutual labels:  vulnerabilities, exploits
Patrowlhears
PatrowlHears - Vulnerability Intelligence Center / Exploits
Stars: ✭ 89 (-62.76%)
Mutual labels:  vulnerabilities, exploits
Kernelpop
kernel privilege escalation enumeration and exploitation framework
Stars: ✭ 628 (+162.76%)
Mutual labels:  vulnerabilities, exploits
0days In The Wild
Repository for information about 0-days exploited in-the-wild.
Stars: ✭ 149 (-37.66%)
Mutual labels:  vulnerabilities, exploits
Arissploit
Arissploit Framework is a simple framework designed to master penetration testing tools. Arissploit Framework offers simple structure, basic CLI, and useful features for learning and developing penetration testing tools.
Stars: ✭ 114 (-52.3%)
Mutual labels:  vulnerabilities, exploits
Zerooo-Exploitation-Framework
异步漏洞利用框架
Stars: ✭ 22 (-90.79%)
Mutual labels:  exploits, vulnerabilities
Poc
Advisories, proof of concept files and exploits that have been made public by @pedrib.
Stars: ✭ 376 (+57.32%)
Mutual labels:  vulnerabilities, exploits
Hacker ezines
A collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (-69.87%)
Mutual labels:  vulnerabilities, exploits
Pakuri
Penetration test Achieve Knowledge Unite Rapid Interface
Stars: ✭ 125 (-47.7%)
Mutual labels:  vulnerabilities
Exploits
Containing Self Made Perl Reproducers / PoC Codes
Stars: ✭ 160 (-33.05%)
Mutual labels:  exploits
Awesome Solidity
A curated list of awesome Solidity resources
Stars: ✭ 111 (-53.56%)
Mutual labels:  vulnerabilities
Cve Search
cve-search - a tool to perform local searches for known vulnerabilities
Stars: ✭ 1,765 (+638.49%)
Mutual labels:  vulnerabilities
Laravel Security Checker
Added Laravel functionality to Enlightn Security Checker. Adds a command to check for, and optionally emails you, vulnerabilities when they affect you.
Stars: ✭ 163 (-31.8%)
Mutual labels:  vulnerabilities
Nailgun
Nailgun attack on ARM devices.
Stars: ✭ 114 (-52.3%)
Mutual labels:  vulnerabilities
Sbt Dependency Check
SBT Plugin for OWASP DependencyCheck. Monitor your dependencies and report if there are any publicly known vulnerabilities (e.g. CVEs). 🌈
Stars: ✭ 187 (-21.76%)
Mutual labels:  vulnerabilities
Go Shodan
Shodan API client
Stars: ✭ 158 (-33.89%)
Mutual labels:  exploits
Nodegoat
The OWASP NodeGoat project provides an environment to learn how OWASP Top 10 security risks apply to web applications developed using Node.js and how to effectively address them.
Stars: ✭ 1,392 (+482.43%)
Mutual labels:  vulnerabilities
Hisilicon Dvr Telnet
PoC materials for article https://habr.com/en/post/486856/
Stars: ✭ 101 (-57.74%)
Mutual labels:  exploits
Osee
Collection of resources for my preparation to take the OSEE certification.
Stars: ✭ 98 (-59%)
Mutual labels:  exploits
Cve Bin Tool
This tool scans for a number of common, vulnerable components (openssl, libpng, libxml2, expat and a few others) to let you know if your system includes common libraries with known vulnerabilities.
Stars: ✭ 211 (-11.72%)
Mutual labels:  vulnerabilities
Vulnerable Apps
Stars: ✭ 179 (-25.1%)
Mutual labels:  vulnerabilities
Tools
Security and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.
Stars: ✭ 1,343 (+461.92%)
Mutual labels:  exploits
Hacksysextremevulnerabledriver
HackSys Extreme Vulnerable Windows Driver
Stars: ✭ 1,330 (+456.49%)
Mutual labels:  vulnerabilities
Cvebase.com
cvebase is a community-driven vulnerability data platform to discover the world's top security researchers and their latest disclosed vulnerabilities & PoCs
Stars: ✭ 88 (-63.18%)
Mutual labels:  vulnerabilities
Exploit Framework
🔥 An Exploit framework for Web Vulnerabilities written in Python
Stars: ✭ 144 (-39.75%)
Mutual labels:  exploits
H4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+4272.8%)
Mutual labels:  exploits
Vuln Web Apps
A curated list of vulnerable web applications.
Stars: ✭ 128 (-46.44%)
Mutual labels:  vulnerabilities
Mysapadventures
A quick methodology on testing / hacking SAP Applications for n00bz and bug bounty hunters
Stars: ✭ 164 (-31.38%)
Mutual labels:  vulnerabilities
Is Website Vulnerable
finds publicly known security vulnerabilities in a website's frontend JavaScript libraries
Stars: ✭ 1,724 (+621.34%)
Mutual labels:  vulnerabilities
Easybuggy
Too buggy web application
Stars: ✭ 189 (-20.92%)
Mutual labels:  vulnerabilities
Docker Vulnerable Dvwa
Damn Vulnerable Web Application Docker container
Stars: ✭ 117 (-51.05%)
Mutual labels:  vulnerabilities
Vulnix
Vulnerability (CVE) scanner for Nix/NixOS.
Stars: ✭ 161 (-32.64%)
Mutual labels:  vulnerabilities
Dependency spy
Find known vulnerabilities in your dependencies
Stars: ✭ 87 (-63.6%)
Mutual labels:  vulnerabilities
Sec Admin
分布式资产安全扫描核心管理系统(弱口令扫描,漏洞扫描)
Stars: ✭ 222 (-7.11%)
Mutual labels:  exploits
Osce
Collection of things made during my preparation to take on OSCE
Stars: ✭ 167 (-30.13%)
Mutual labels:  exploits
Springbootvulexploit
SpringBoot 相关漏洞学习资料,利用方法和技巧合集,黑盒安全评估 check list
Stars: ✭ 3,196 (+1237.24%)
Mutual labels:  exploits
Cdk
CDK is an open-sourced container penetration toolkit, offering stable exploitation in different slimmed containers without any OS dependency. It comes with penetration tools and many powerful PoCs/EXPs helps you to escape container and takeover K8s cluster easily.
Stars: ✭ 1,264 (+428.87%)
Mutual labels:  exploits
Lpe
collection of verified Linux kernel exploits
Stars: ✭ 159 (-33.47%)
Mutual labels:  exploits
S2e
S2E: A platform for multi-path program analysis with selective symbolic execution.
Stars: ✭ 102 (-57.32%)
Mutual labels:  vulnerabilities
Linux Soft Exploit Suggester
Search Exploitable Software on Linux
Stars: ✭ 187 (-21.76%)
Mutual labels:  vulnerabilities
Routersploit
Exploitation Framework for Embedded Devices
Stars: ✭ 9,866 (+4028.03%)
Mutual labels:  exploits
Exploits
Exploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity
Stars: ✭ 154 (-35.56%)
Mutual labels:  exploits
Vulnerability Rating Taxonomy
Bugcrowd’s baseline priority ratings for common security vulnerabilities
Stars: ✭ 227 (-5.02%)
Mutual labels:  vulnerabilities
Computer Science Resources
A list of resources in different fields of Computer Science (multiple languages)
Stars: ✭ 1,316 (+450.63%)
Mutual labels:  exploits
Vulncost
Find security vulnerabilities in open source npm packages while you code
Stars: ✭ 146 (-38.91%)
Mutual labels:  vulnerabilities
Avpwn
List of real-world threats against endpoint protection software
Stars: ✭ 179 (-25.1%)
Mutual labels:  exploits
Awesome Nodejs Security
Awesome Node.js Security resources
Stars: ✭ 1,294 (+441.42%)
Mutual labels:  vulnerabilities
Sdwannewhope
SD-WAN security and insecurity
Stars: ✭ 141 (-41%)
Mutual labels:  vulnerabilities
Thoron
Thoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-63.6%)
Mutual labels:  vulnerabilities
Vulny Code Static Analysis
Python script to detect vulnerabilities inside PHP source code using static analysis, based on regex
Stars: ✭ 207 (-13.39%)
Mutual labels:  vulnerabilities
Awesome Vulnerable
A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.
Stars: ✭ 133 (-44.35%)
Mutual labels:  vulnerabilities
Pentesting toolkit
🏴‍☠️ Tools for pentesting, CTFs & wargames. 🏴‍☠️
Stars: ✭ 1,268 (+430.54%)
Mutual labels:  vulnerabilities
Web exploit detector
The Web Exploit Detector is a Node.js application used to detect possible infections, malicious code and suspicious files in web hosting environments
Stars: ✭ 81 (-66.11%)
Mutual labels:  exploits
Houndsploit
An advanced graphical search engine for Exploit-DB
Stars: ✭ 81 (-66.11%)
Mutual labels:  exploits
Discord Exploit Collection
A collection of Discord bugs and exploits
Stars: ✭ 166 (-30.54%)
Mutual labels:  exploits
Awesome Csirt
Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Stars: ✭ 132 (-44.77%)
Mutual labels:  exploits
Vwgen
Vulnerable Web applications Generator
Stars: ✭ 75 (-68.62%)
Mutual labels:  vulnerabilities
Anchore Engine
A service that analyzes docker images and applies user-defined acceptance policies to allow automated container image validation and certification
Stars: ✭ 1,192 (+398.74%)
Mutual labels:  vulnerabilities
Archerysec
Centralize Vulnerability Assessment and Management for DevSecOps Team
Stars: ✭ 1,802 (+653.97%)
Mutual labels:  vulnerabilities
Insecureprogramming
mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/
Stars: ✭ 229 (-4.18%)
Mutual labels:  vulnerabilities
1-60 of 221 similar projects