A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
-
Updated
Jun 26, 2024 - Shell
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
An automation tool that scans sub-domains, sub-domain takeover, then filters out XSS, SSTI, SSRF, and more injection point parameters and scans for some low hanging vulnerabilities automatically.
Runs Trivy as GitHub action to scan your Docker container image for vulnerabilities
OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).
A script to automate privilege escalation with CVE-2023-22809 vulnerability
Designed to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .onion
ScanPro - NMap Scanning Scripts ~ Network Mapper
Automated privilege escalation of the world's most popular Docker images.
Kubernetes security and vulnerability tools and utilities.
XSS Finder Via SSTI
ProxyToken (CVE-2021-33766) : An Authentication Bypass in Microsoft Exchange Server POC exploit
Hack Cctv Vuln 2020
A collection of awesome security hardening software, libraries, learning tutorials & documents, e-books, best practices, checklists, benchmarks about hardening in Cybersecurity
Privilege escalation in Docker
Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.
A learning and testing environment for web application hacking and pentesting.
Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker
This is created for updating Various Viruses, malware, and all! Also new kind for vulnerability and attacks!
Add a description, image, and links to the vulnerability topic page so that developers can more easily learn about it.
To associate your repository with the vulnerability topic, visit your repo's landing page and select "manage topics."