Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for python vulnerabilities
python
x
vulnerabilities
x
265 search results found
Telegram Trilateration
⭐
242
Proof of concept for abusing Telegram's "People Near Me" feature and tracking people's location
Robot Detect
⭐
239
Detection script for the ROBOT vulnerability
Security Scripts
⭐
238
A collection of security related Python and Bash shell scripts. Analyze hosts on generic security vulnerabilities. Wrapper around popular tools like nmap (portscanner), nikto (webscanner) and testssl.sh (SSL/TLS scanner)
Karonte
⭐
235
Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware
Struts Pwn_cve 2017 9805
⭐
234
An exploit for Apache Struts CVE-2017-9805
Portfoliohub
⭐
233
Your portfolio is captured here! Tag #portfolio-website on your repository.
Libssh Scanner
⭐
232
Script to identify hosts vulnerable to CVE-2018-10933
Cyberowl
⭐
230
A daily updated summary of the most frequent types of security incidents currently being reported from different sources.
Ble Security Attack Defence
⭐
224
✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth LE stacks.
Cve 2017 7494
⭐
224
Remote root exploit for the SAMBA CVE-2017-7494 vulnerability
Blueborne
⭐
221
Purpose only! The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth stacks.
Community
⭐
213
Damnwebscanner
⭐
213
Another web vulnerabilities scanner, this extension works on Chrome and Opera
Http Request Smuggling
⭐
213
HTTP Request Smuggling Detection Tool
Linux Soft Exploit Suggester
⭐
204
Search Exploitable Software on Linux
Hadoop Attack Library
⭐
200
A collection of pentest tools and resources targeting Hadoop environments
Vulnfanatic
⭐
196
A Binary Ninja plugin for vulnerability research.
Zabbix Threat Control
⭐
194
Zabbix vulnerability assessment plugin
Ocean_ctf
⭐
192
CTF平台 支持docker 动态部署题目、分数统计、作弊检测,静态题目,漏洞复现。
Cve 2015 1538 1
⭐
191
An exploit for CVE-2015-1538-1 - Google Stagefright ‘stsc’ MP4 Atom Integer Overflow Remote Code Execution
Firminator_backend
⭐
188
The first open source vulnerability scanner for firmwares
Phpvuln
⭐
185
🕸️ Audit tool to find common vulnerabilities in PHP source code
Deadshot
⭐
184
Deadshot is a Github pull request scanner to identify sensitive data being committed to a repository
Cve 2019 1040
⭐
184
CVE-2019-1040 with Exchange
Vulners Scanner
⭐
183
Vulnerability scanner based on vulners.com audit API
Inthewilddb
⭐
183
Hourly updated database of exploit and exploitation reports
Jfrog Vscode Extension
⭐
176
JFrog VS-Code Extension
Vdiscover
⭐
173
A tool to predict vulnerability discovery of binary only programs
Pyscan
⭐
172
python dependency vulnerability scanner, written in Rust.
Cve 2017 8570
⭐
172
Proof of Concept exploit for CVE-2017-8570
Cve 2018 0296
⭐
169
Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.
Adapt
⭐
168
ADAPT is a tool that performs automated Penetration Testing for WebApps.
Ntlm Scanner
⭐
167
A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities
Php Code Audit
⭐
167
php code audit for cms vulnerabilities / 代码审计,对一些大型cms漏洞的复现研究,更新源码和漏洞exp
Vision2
⭐
167
Nmap's XML result parse and NVD's CPE correlation to search CVE.
Aemscan
⭐
163
Adobe Experience Manager Vulnerability Scanner
Typo3scan
⭐
162
Enumerate Typo3 version and extensions
Recon
⭐
161
Recon is a script to perform a full recon on a target with the main tools to search for vulnerabilities. Created based on @ofjaaah and @Jhaddix methodologies
Egyscan
⭐
157
Egyscan The Best web vulnerability scanner; it's a multifaceted security powerhouse designed to fortify your web applications against malicious threats. Let's delve into the tasks and functions that make Egyscan an indispensable tool in your security arsenal:
Beehive
⭐
156
Beehive is an open-source vulnerability detection framework based on Beebeeto-framework. Security researcher can use it to find vulnerability, exploits, subsequent attacks, etc.
Worldsfirstsha2vulnerability
⭐
153
Sha256 vulnerability for full rounds. Circular hash attack.
Burp_wp
⭐
153
Find known vulnerabilities in WordPress plugins and themes using Burp Suite proxy. WPScan like plugin for Burp.
Patrowlhears
⭐
150
PatrowlHears - Vulnerability Intelligence Center / Exploits
Gvm Tools
⭐
150
Remote control your Greenbone Community Edition or Greenbone Enterprise Appliance
Dorkme
⭐
149
[WORKING IN V2, WITH PROXIES, CUSTOM USER AGENT... TO MUCH BETTER!]DorkMe is a tool designed with the purpose of making easier the searching of vulnerabilities with Google Dorks, such as SQL Injection vulnerabilities.
R00kie Kr00kie
⭐
148
PoC exploit for the CVE-2019-15126 kr00k vulnerability
Django Zombodb
⭐
147
Easy Django integration with Elasticsearch through ZomboDB Postgres Extension
Ida Sploiter
⭐
145
IDA Sploiter is a plugin for Hex-Ray's IDA Pro disassembler designed to enhance IDA's capabilities as an exploit development and vulnerability research tool.
Sqlifinder
⭐
144
SQL Injection Vulnerability Scanner made with Python
Shellfire
⭐
143
An exploitation shell focusing on exploiting command injection vulnerabilities, eg., LFI, RFI, SSTI, etc.
Serializekiller
⭐
142
Mass scanner for the Java serialize bug
Nerve
⭐
140
NERVE Continuous Vulnerability Scanner
Pentest Tools Framework
⭐
140
Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities
Exploit Framework
⭐
139
🔥 An Exploit framework for Web Vulnerabilities written in Python
Everythingcrypto
⭐
138
(Still exploring) My cryptography journey: A collection of notebooks covering different algorithms and concepts from cryptography
Vulnerable Soap Service
⭐
138
Erlik - Vulnerable Soap Service
Nessus_map
⭐
138
Parse .nessus file(s) and shows output in interactive UI
Scriptsandexploits
⭐
137
Some scripts and exploits
Kitsec Core
⭐
136
Ethical hacking, made easy.
Patch Checker
⭐
135
Web-based check for Windows privesc vulnerabilities
Vulntoes
⭐
133
Vulnerability Data in ES
Secpub
⭐
133
Published security vulnerabilities, research, and associated information.
Rvd
⭐
132
Robot Vulnerability Database. An archive of robot vulnerabilities and bugs.
Offensive Dockerfiles
⭐
132
Offensive tools as Dockerfiles. Lightweight & Ready to go
Not Your Average Web Crawler
⭐
130
A web crawler (for bug hunting) that gathers more than you can imagine.
Jetleak Testing Script
⭐
127
Script to test if a server is vulnerable to the JetLeak vulnerability
Spoolsploit
⭐
127
A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.
Pysqli
⭐
125
Python SQL injection framework
Sap_recon
⭐
125
PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)
Cve 2019 11539
⭐
125
Exploit for the Post-Auth RCE vulnerability in Pulse Secure Connect
Smtptester
⭐
123
small python3 tool to check common vulnerabilities in SMTP servers
Vulnerable Flask App
⭐
121
Erlik 2 - Vulnerable-Flask-App
Trishul
⭐
121
Burp Extension written in Jython to hunt for common vulnerabilities found in websites. Developed by Gaurav Narwani to help people find vulnerabilities and teach how to exploit them.
Cve 2019 11043
⭐
121
(PoC) Python version of CVE-2019-11043 exploit by neex
Tock
⭐
120
We use Tock to track and report our time at 18F
Data
⭐
120
User, contributor and developer friendly vulnerability database
Traxss
⭐
117
traxss | Automated XSS Vulnerability Scanner Currently In Development 🐍 HACKTOBERFEST PROJECT 2019
Safiler
⭐
117
Safari local file reader
Oasislmf
⭐
114
Loss modelling framework.
Camera Exploit Tool
⭐
113
Automated exploit scanner for cameras on the internet
Doork
⭐
110
Passive Vulnerability Auditor
Cve 2019 0708
⭐
110
Only Hitting PoC [Tested on Windows Server 2008 r2]
Cryptodeeptools
⭐
110
Crypto Deep Tools a set of scripts for detailed cryptanalysis of the Blockchain network in cryptocurrency Bitcoin
Tiger
⭐
108
Python toolbox to evaluate graph vulnerability and robustness (CIKM 2021)
Wps 0day 20230809
⭐
108
WPS-Office 1-Click RCE exp 202308091546
Uefi_boot_script_expl
⭐
105
CHIPSEC module that exploits UEFI boot script table vulnerability
3102
⭐
105
A domain/ip fuzzing tool for vulnerability mining
Vulcat
⭐
104
vulcat可用于扫描Web端常见的CVE、CNVD等编号的漏洞,发现漏洞时会返回Payload信息
Mrspicky
⭐
101
MrsPicky - An IDAPython decompiler script that helps auditing calls to the memcpy() and memmove() functions.
Scan Framework
⭐
100
A framework used for Vulnerability scanning
Cve Flow
⭐
100
CVE Data Analysis, CVE Monitor, CVE EXP Prediction Based on Deep Learning. 1999-2020年存量CVE数据分析、监控CVE增量更新、基于深度学习的CVE EXP预测和自动化推送
Check Cve 2019 19781
⭐
98
Test a host for susceptibility to CVE-2019-19781
Python Gvm
⭐
97
Greenbone Vulnerability Management Python Library
Browser_vuln_check
⭐
97
browser_vuln_check ,利用已知的浏览器漏洞PoC 来快速检测Webview 和浏览器环境是否存在安全漏洞,只需要访问run.html 即可获取所有扫描结果,适用场景包含:APP 发布之前的内部安全测试,第三方Webview 漏洞检测等(browser_vuln_check framework using some known browser vulnerabilities PoC to quick automate aduit WebView or Browser security ,apply to application security before issue and detecting third-part WebView security)..
Kenzer Templates
⭐
96
essential templates for kenzer [DEPRECATED]
Web Cve Tests
⭐
95
A simple framework for sending test payloads for known web CVEs.
Jake
⭐
95
Check your Python environments for vulnerable Open Source packages with OSS Index or Sonatype Nexus Lifecycle.
Wapiti
⭐
93
A web-application vulnerability scanner
Xssya
⭐
93
XSSYA (Cross Site Scripting Scanner & Vulnerability Confirmation)
Django_cve_2019_19844_poc
⭐
92
PoC for CVE-2019-19844(https://www.djangoproject.com/weblo
Related Searches
Python Django (26,879)
Python Machine Learning (20,195)
Python Dataset (14,792)
Python Docker (14,603)
Python Flask (14,408)
Python Tensorflow (13,736)
Python Command Line (13,351)
Python Deep Learning (13,092)
Python Jupyter Notebook (12,976)
Security Vulnerabilities (12,350)
101-200 of 265 search results
< Previous
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.