awesome-cve-poc VS Infosec_Reference

Compare awesome-cve-poc vs Infosec_Reference and see what are their differences.

InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
awesome-cve-poc Infosec_Reference
2 9
3,213 5,365
- -
0.0 4.2
over 2 years ago 13 days ago
CSS
- MIT License
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

awesome-cve-poc

Posts with mentions or reviews of awesome-cve-poc. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-03-15.

Infosec_Reference

Posts with mentions or reviews of Infosec_Reference. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-01-07.

What are some alternatives?

When comparing awesome-cve-poc and Infosec_Reference you can also consider the following projects:

attack-stix-data - STIX data representing MITRE ATT&CK

API-Security-Checklist - Checklist of the most important security countermeasures when designing, testing, and releasing your API

hackdroid - Security Apps for Android

red_team_attack_lab - Red Team Attack Lab for TTP testing & research

the_cyber_plumbers_handbook - Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss.

AlanFramework - A C2 post-exploitation framework

bugbounty-cheatsheet - A list of interesting payloads, tips and tricks for bug bounty hunters.

awesome-web-hacking - A list of web application security

MAL-CL - MAL-CL (Malicious Command-Line)

byeintegrity8-uac - Bypass UAC at any level by abusing the Program Compatibility Assistant with RPC, WDI, and more Windows components

capsulecorp-pentest - Vagrant VirtualBox environment for conducting an internal network penetration test

hacker101 - Source code for Hacker101.com - a free online web and mobile security class.