vulnerability
Here are 520 public repositories matching this topic...
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
-
Updated
Jun 3, 2020 - Python
In a server / client setup it would be great if Trivy would expose some metrics about the scans happen with the central server.
Some useful metrics for my implementation:
- Last DB Update (timestamp)
- Last DB Update Attempt (timestamp)
- Sum of Issues found
- Sum of Issues found splited up in SEVERITY
- Sum of Issues found splited up in sources (OS, Python, Node etc)
As Trivy is build to
Automated pentest framework for offensive security experts
-
Updated
May 2, 2020 - Shell
一款完善的安全评估工具,支持常见 web 安全问题扫描和自定义 poc | 使用之前务必先阅读文档
-
Updated
Jun 3, 2020 - Vue
To facilitate easier studying of these types of vulnerabilities the tool scaffolding should be able to instrument itself to generate ASCII diagrams of payload object-graphs (similar to this) and deserialization code execution call-trees (similar to [this](https://gist.github.com/frohoff/24af7913611f8406ea
Multiples wiki issues.
Typos
- https://github.com/infobyte/faraday/wiki/Executive-Report#using-markdown-on-a-report: -lenguage +language
Bad links
- https://github.com/infobyte/faraday/wiki/Executive-Report#requirements: https://github.com/infobyte/faraday/wiki/first-steps, the nedpoint
first-stepsdoesn't exist anymore.
Images
Advanced vulnerability scanning with Nmap NSE
-
Updated
May 22, 2020 - Lua
XVWA is a badly coded web application written in PHP/MySQL that helps security enthusiasts to learn application security.
-
Updated
Jul 1, 2019 - PHP
Reverse Shell as a Service
-
Updated
Nov 19, 2019 - JavaScript
Automatic SSRF fuzzer and exploitation tool
-
Updated
Jan 28, 2020 - Python
Penetration tests guide based on OWASP including test cases, resources and examples.
-
Updated
May 8, 2020
Describe the bug
When using the init_kibana.sh, the script creates a new logstash-vulnwhisperer-* index. This one is however empty.
when I create a index myself, I see the elasticsearch hits. Since the UI elements are bound to the index ID of the created index, I c
Penetration Testing Platform
-
Updated
May 10, 2020 - Python
Vulnerability Labs for security analysis
-
Updated
Nov 2, 2018 - Python
Container Image Linter for Security, Helping build the Best-Practice Docker Image, Easy to start
-
Updated
Mar 8, 2020 - Go
SQL Vulnerability Scanner
-
Updated
Jan 11, 2018 - Ruby
vulnx
-
Updated
Apr 20, 2020 - Python
Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340
-
Updated
Jun 1, 2020 - Python
The database is saved to and used from the current directory versus somewhere better like ~/.vfeed/. This hampers several things, but most notably putting a symlink somewhere in my path to be able to call/use vfeedcli.py from any directory (cd ~/bin; ln -s path/to/vFeed/vfeedcli.py vfeed) like a system-wide command.
Btw, I have a patch for this already and will sent a PR shortly.
Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
-
Updated
Aug 14, 2019 - Python
Steal Net-NTLM Hash using Bad-PDF
-
Updated
Apr 11, 2020 - Python
Open Vulnerability Assessment Scanner - Scanner for Greenbone Vulnerability Management (GVM)
-
Updated
Jun 3, 2020 - C
ES File Explorer Open Port Vulnerability - CVE-2019-6447
-
Updated
Jan 22, 2019 - Python
OPCDE Cybersecurity Conference Materials
-
Updated
May 21, 2020 - C++
Update main table
The table on the main README is pretty outdated.
It'd be great if someone could update it.
Adding a few entries from the repo to the table is already a valuable help
😈
Improve this page
Add a description, image, and links to the vulnerability topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the vulnerability topic, visit your repo's landing page and select "manage topics."



It would be great if we add solution to each section that protects your code/server.
For example a PHP script that sanitises request strings against all attacks