| Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
|---|---|---|---|---|---|---|---|---|---|---|
| YagamiiLight/Cerberus | 246 | 0 | 0 | over 6 years ago | 0 | 5 | Python | |||
| 一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能 | ||||||||||
| Saferman/CVE-2020-7471 | 79 | 0 | 0 | about 6 years ago | 0 | 0 | Python | |||
| django 漏洞:CVE-2020-7471 Potential SQL injection via StringAgg(delimiter) 的漏洞环境和 POC | ||||||||||
| eddietcc/CVEnotes | 20 | 0 | 0 | over 6 years ago | 0 | 1 | ||||
| mukarramkhalid/joomla-sqli-mass-exploit | 19 | 0 | 0 | over 4 years ago | 0 | 0 | Python | |||
| Joomla 3.2 to 3.4.4 Remote SQL Injection Mass Exploit | ||||||||||
| anquanquantao/iwantacve | 17 | 0 | 0 | almost 8 years ago | 0 | 1 | ||||
| 套哥代你申请CVE啦!~~~ | ||||||||||
| superfish9/pt | 9 | 0 | 0 | over 3 years ago | 0 | 0 | Python | |||
| 1120362990/Paper | 9 | 0 | 0 | about 6 years ago | 0 | 0 | Python | |||
| 漏洞复现、工具测试、技术练习 | ||||||||||
| JavierOlmedo/joomla-cve-2018-6396 | 8 | 0 | 0 | about 8 years ago | 0 | 0 | Python | |||
| Joomla - Component Google Map Landkarten <= 4.2.3 - SQL Injection | ||||||||||
| 0xUhaw/CVE-Bins | 6 | 0 | 0 | almost 5 years ago | 0 | 0 | PHP | |||
| This our note | ||||||||||
| rajganeshp/waed | 5 | 0 | 0 | almost 9 years ago | 0 | 0 | gpl-2.0 | Shell | ||
| Web Application and Exploitation Distribution | ||||||||||