0xMarcio / cveLinks
Latest CVEs with their Proof of Concept exploits.
☆1,053Updated this week
Alternatives and similar repositories for cve
Users that are interested in cve are comparing it to the libraries listed below
Sorting:
- ☆630Updated last month
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆580Updated last week
- Collection of Notes and CheatSheets used for Red teaming Certs☆482Updated 2 years ago
- A fast WordPress plugin enumeration tool☆748Updated this week
- Header Exploitation HTTP☆695Updated last month
- HackTheBox Certified Penetration Tester Specialist Cheatsheet☆629Updated last year
- A collection of useful tools and scripts were developed and gathered throughout the Offensive Security's PEN-300 (OSEP) course.☆315Updated 4 months ago
- This is for Ethical Use only. The default automated binaries created are all burned. I have added the script to the repo to modify certai…☆444Updated 7 months ago
- Red team Interview Questions☆723Updated 8 months ago
- Automation tool to testing and confirm the xss vulnerability.☆303Updated 5 months ago
- ☆579Updated 4 months ago
- Everything from my OSEP study.☆180Updated 11 months ago
- LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113☆510Updated 11 months ago
- My WriteUps for HackTheBox CTFs, Machines, and Sherlocks.☆157Updated last week
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆385Updated last month
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆388Updated 9 months ago
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆776Updated last week
- how to look for Leaked Credentials !☆1,014Updated last year
- CVE-2025-29927 Proof of Concept☆93Updated 9 months ago
- AI-powered ffuf wrapper☆616Updated 3 weeks ago
- A deliberately vulnerable banking application designed for practicing Security Testing of Web App, APIs, AI integrated App and secure cod…☆524Updated last month
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).☆227Updated 9 months ago
- Bug Bounty Hunting Framework Designed to Help Beginners Compete w/ the Pros☆454Updated this week
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆165Updated last year
- A comprehensive collection of resources, tools, tips, and guides for preparing and succeeding in the OSCP (Offensive Security Certified P…☆387Updated 6 months ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆809Updated 9 months ago
- A simple tool for bypassing file upload restrictions.☆889Updated last year
- Demonized Shell is an Advanced Tool for persistence in linux.☆428Updated 11 months ago
- EDR & Antivirus Bypass to Gain Shell Access☆246Updated last year
- A list of all Active Directory machines from HackTheBox☆196Updated last month