Vulnerabilities

OSV : Open Source Vulnerabilities

OSV is a vulnerability database and triage infrastructure for open source projects aimed at helping both open source maintainers and…

4 years ago

XSSTRON : Electron JS Browser To Find XSS Vulnerabilities

XSSTRON is a powerful Chromium Browser to find XSS Vulnerabilities automatically while browsing web, it can detect many case scenarios…

4 years ago

XSS-Scanner : Scanner That Detects Cross-Site Scripting Vulnerabilities In Website

XSS-Scanner is a cross-site scripting (XSS) is one of the most well known web application vulnerabilities. It even has a…

4 years ago

DazzleUP : A Tool That Detects The Privilege Escalation Vulnerabilities

DazzleUP is a tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates in the Windows operating…

4 years ago

HackerEnv : Sweep IPs & Scan Ports, Vulnerabilities & Exploit Them

hackerEnv is an automation tool that quickly and easily sweep IPs and scan ports, vulnerabilities and exploit them. Then, it…

4 years ago

Shodanfy.py : Get Ports, Vulnerabilities, Informations, Banners

Shodanfy.py is a tool to get ports,vulnerabilities,informations,banners,..etc for any IP with Shodan (no apikey! no rate limit!) Usage Also Read…

4 years ago

Vulnx : Auto Shell Injector That Detect Vulnerabilities In Multiple Types Of CMS

Vulnx is An Intelligent Bot Auto Shell Injector that detects vulnerabilities in multiple types of Cms, fast cms detection,information gathering…

5 years ago

XXExploiter : Tool To Help Exploit XXE Vulnerabilities

XXExploiter is a tool to help exploit XXE vulnerabilities. They wrote this tool to help me testing XXE vulnerabilities. It…

5 years ago

Grouper2 : To Find Vulnerabilities In AD Group Policy

Grouper2 is a tool to find vulnerabilities in AD group policy. It is a tool for pentesters to help find…

5 years ago

Karonte : Static Analysis Tool To Detect Multi-Binary Vulnerabilities In Embedded Firmware

Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware. Research Paper We present our approach and…

5 years ago