Statistics for topic vulnerability
RepositoryStats tracks 595,858 Github repositories, of these 338 are tagged with the vulnerability topic. The most common primary language for repositories using this topic is Python (120). Other languages include: Go (30), Java (20), C (14), JavaScript (14), C++ (12), Shell (12)
Stargazers over time for topic vulnerability
Most starred repositories for topic vulnerability (view more)
Trending repositories for topic vulnerability (view more)
serve as a reverse proxy to protect your web services from attacks and exploits.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artif...
Delveline is a Code Vulnerability Analyzer for Java and Kotlin that supports best practices in security and risk management.
Web 版 Java Payload 生成与利用工具,提供 Java 反序列化、Hessian 1/2 反序列化等Payload生成,以及 JNDI、Fake Mysql、JRMPListener 等利用|The web version of Java Payload generation and utilization tool provides Payload generation such ...
Runs Trivy as GitHub action to scan your Docker container image for vulnerabilities
serve as a reverse proxy to protect your web services from attacks and exploits.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artif...
Delveline is a Code Vulnerability Analyzer for Java and Kotlin that supports best practices in security and risk management.
Tool for collecting vulnerability data from various sources (used to build the grype database)
Web 版 Java Payload 生成与利用工具,提供 Java 反序列化、Hessian 1/2 反序列化等Payload生成,以及 JNDI、Fake Mysql、JRMPListener 等利用|The web version of Java Payload generation and utilization tool provides Payload generation such ...
Bug Bounty Tricks and useful payloads and bypasses for Web Application Security.
serve as a reverse proxy to protect your web services from attacks and exploits.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artif...
A Laravel package that proactively monitors your dependencies for security vulnerabilities by running automated composer audits and sending notifications via webhooks and email
CVE-2024-52940 - A zero-day vulnerability in AnyDesk's "Allow Direct Connections" feature, discovered and registered by Ebrahim Shafiei (EbraSha), exposing public and private IP addresses. For details...
Bug Bounty Tricks and useful payloads and bypasses for Web Application Security.
Web 版 Java Payload 生成与利用工具,提供 Java 反序列化、Hessian 1/2 反序列化等Payload生成,以及 JNDI、Fake Mysql、JRMPListener 等利用|The web version of Java Payload generation and utilization tool provides Payload generation such ...
Some Useful Tricks for Pentest Android and iOS Apps
Web 版 Java Payload 生成与利用工具,提供 Java 反序列化、Hessian 1/2 反序列化等Payload生成,以及 JNDI、Fake Mysql、JRMPListener 等利用|The web version of Java Payload generation and utilization tool provides Payload generation such ...
:: Prism X · Automated Enterprise Network Security Risk Detection and Vulnerability Scanning Tool / 棱镜 X · 自动化企业网络安全风险检测、漏洞扫描工具
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
serve as a reverse proxy to protect your web services from attacks and exploits.
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artif...
A vulnerability scanner for container images and filesystems
:: Prism X · Automated Enterprise Network Security Risk Detection and Vulnerability Scanning Tool / 棱镜 X · 自动化企业网络安全风险检测、漏洞扫描工具
Octoscan is a static vulnerability scanner for GitHub action workflows.
Web 版 Java Payload 生成与利用工具,提供 Java 反序列化、Hessian 1/2 反序列化等Payload生成,以及 JNDI、Fake Mysql、JRMPListener 等利用|The web version of Java Payload generation and utilization tool provides Payload generation such ...