Loading...
Browse 35 vulnerability tools
Scans and catalogs AI agent skills/plugins for security vulnerabilities.
Automated C code analysis and repair tool benchmarked against NIST SAMATE.
Automated code repair tool that detects and fixes security/reliability bugs.
Managed VDP for receiving, triaging & responding to researcher vuln reports.
Snort-compatible IDS/IPS rules, PCAPs & exploit library for security testing.
Snort-compatible IDS/IPS rules & PCAP library covering 21,000+ proven exploits.
Automated OS & software patch management via lightweight endpoint agent.
Searchable open source vulnerability DB aggregating CVEs from NVD & GitHub.
Free community tool for asset visibility across devices, apps, and vulns.
Embedded systems security for IoT devices and operating systems
Threat advisory service providing security alerts on CVEs and ransomware.
Platform for responsible disclosure of security vulnerabilities
Threat intelligence service providing alerts, analysis, and support
A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
A Python script that finds endpoints in JavaScript files to identify potential security vulnerabilities.
A tool to help exploit XXE vulnerabilities by sending a crafted XML file to the server and parsing it to extract the data.
A simple Python script to test for a hypothetical JWT vulnerability
A project providing honeypots for embedded device vulnerabilities with support for AWS integration and JSON output.
A Windows kernel driver intentionally designed with various vulnerabilities to help security researchers practice kernel exploitation techniques.
Guidelines for secure coding in Java SE to avoid bugs that could weaken security and open holes in Java's security features.
A Docker security vulnerability where disabling inter-container communication (ICC) fails to block raw ethernet frames, allowing unexpected data transfer between containers via raw sockets.
Pac-resolver, a popular NPM package with 3 million weekly downloads, has a severe remote code execution flaw.
Get strategic cybersecurity insights in your inbox