Community curated list of templates for the nuclei engine to find security vulnerabilities.
-
Updated
Jun 1, 2024 - JavaScript
Exploit refers to a piece of code or technique that takes advantage of a security vulnerability in a system, application, or network to cause unintended behavior. Exploits can be used by attackers to gain unauthorized access, escalate privileges, execute arbitrary code, or cause a denial of service. This topic covers the various types of exploits, such as zero-day exploits, remote code execution, and privilege escalation. It also explores the lifecycle of an exploit, from discovery and development to deployment and mitigation, and highlights the importance of vulnerability management and patching in preventing exploits.
Community curated list of templates for the nuclei engine to find security vulnerabilities.
VMClarity is a tool for agentless detection and management of Virtual Machine Software Bill Of Materials (SBOM) and vulnerabilities
Nuclei POC,每日更新 | 自动整合全网Nuclei的漏洞POC,实时同步更新最新POC,保存已被删除的POC。通过批量克隆Github项目,获取Nuclei POC,并将POC按类别分类存放,使用Github Action实现
The EXCLUSIVE Collection of 36,000+ Nuclei templates based on Wordfence intel. Daily updates for bulletproof WordPress security.
This repository contains multiple exploits I have written for various CVEs and CTFs
Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's Asteroid and Bug Bounty programs.
Fix exploits on anarchy Minecraft servers
Random stuff
A repository of PoCs for ronin-exploits
PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282
📦 Make security testing of K8s, Docker, and Containerd easier.
Exploits R&D
Exploitation Framework for Embedded Devices
针对SpringBoot的开源渗透框架,以及Spring相关高危漏洞利用工具
Modular penetration testing platform that enables you to write, test, and execute exploit code.
Repository for information about 0-days exploited in-the-wild.
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more.
Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Created by The cybersecurity community