A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
-
Updated
May 25, 2024 - Shell
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
Runs Trivy as GitHub action to scan your Docker container image for vulnerabilities
An automation tool that scans sub-domains, sub-domain takeover, then filters out XSS, SSTI, SSRF, and more injection point parameters and scans for some low hanging vulnerabilities automatically.
A script to automate privilege escalation with CVE-2023-22809 vulnerability
OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).
ProxyToken (CVE-2021-33766) : An Authentication Bypass in Microsoft Exchange Server POC exploit
Sudo <= 1.8.14 Local Privilege Escalation and vulnerable container
This is created for updating Various Viruses, malware, and all! Also new kind for vulnerability and attacks!
Designed to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .onion
XSS Finder Via SSTI
Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container
ScanPro - NMap Scanning Scripts ~ Network Mapper
Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.
Hack Cctv Vuln 2020
Privilege escalation in Docker
Start your journey with Bug Bounty.
Automated privilege escalation of the world's most popular Docker images.
Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker
Add a description, image, and links to the vulnerability topic page so that developers can more easily learn about it.
To associate your repository with the vulnerability topic, visit your repo's landing page and select "manage topics."