Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for cve information security
cve
x
information-security
x
1 search results found
Red Teaming Toolkit
⭐
8,230
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
Cve
⭐
5,806
Gather and update all available and newest CVEs with their PoC.
Faraday
⭐
4,422
Open Source Vulnerability Management Platform
Mongoaudit
⭐
1,154
🔥 A powerful MongoDB auditing and pentesting tool 🔥
Moonwalk
⭐
1,033
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
Esfileexploreropenportvuln
⭐
668
ES File Explorer Open Port Vulnerability - CVE-2019-6447
Scant3r
⭐
657
ScanT3r - Module based Bug Bounty Automation Tool
Defi Threat
⭐
467
a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations on decentralized finance
Webmap
⭐
451
WebMap-Nmap Web Dashboard and Reporting
Sbt Dependency Check
⭐
259
SBT Plugin for OWASP DependencyCheck. Monitor your dependencies and report if there are any publicly known vulnerabilities (e.g. CVEs). 🌈
Cve 2019 1003000 Jenkins Rce Poc
⭐
254
Jenkins RCE Proof-of-Concept: SECURITY-1266 / CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative)
Pwn Pulse
⭐
131
Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)
Cve 2021 21315 Poc
⭐
121
CVE 2021-21315 PoC
Cvebase.com
⭐
106
cvebase is a community-driven vulnerability data platform to discover the world's top security researchers and their latest disclosed vulnerabilities & PoCs
Cve 2018 20555
⭐
78
Social Network Tabs Wordpress Plugin Vulnerability - CVE-2018-20555
Log4j
⭐
74
Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.
Hardware Attacks State Of The Art
⭐
67
Microarchitectural exploitation and other hardware attacks.
Containers
⭐
53
Automated privilege escalation of the world's most popular Docker images.
Cve 2023 6553
⭐
49
Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution
Remote Code Execution Sample
⭐
24
Demonstrate how usage of the Java Security Manager can prevent Remote Code Execution (RCE) exploits.
Pyparser Cve
⭐
23
Multi source CVE/exploit parser.
Nvd_api
⭐
18
An unofficial, RESTful API for NIST's NVD
Cyberhall
⭐
15
🛡️ 🌐 🥷🏻 Everything CyberSecurity Related 🏴☠️ 👾 🕵🏾
Cybersec
⭐
12
CYBERSEC - A Cybersecurity Discord Bot
Cve Details Extension
⭐
11
Hover over cve id's on the website to get a helpful summary.
Cvestack
⭐
8
Scan products in your stack for known vulnerabilities
Cve Fuzzing Poc
⭐
7
PoCs discovered through fuzzing which resulted in a CVE assignment.
Tendaspill
⭐
6
An exploitation tool to extract passwords using CVE-2015-5995.
Cve_database
⭐
6
The Common Vulnerabilities Exposures (CVE) Database
Python3 Tools
⭐
6
Python3 Tools that may be useful to pen testers
Related Searches
Python Cve (840)
Exploitation Cve (742)
Vulnerabilities Cve (661)
Python Information Security (342)
Penetration Testing Information Security (281)
Cve Rce (250)
Security Cve (225)
C Cve (224)
1-1 of 1 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.