Latest CVEs with their Proof of Concept exploits.
☆1,180Mar 25, 2026Updated this week
Alternatives and similar repositories for cve
Users that are interested in cve are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2025-5777 Citrix NetScaler Memory Leak Exploit (CitrixBleed 2)☆31Jul 11, 2025Updated 8 months ago
- Detection for CVE-2025-61882 & CVE-2025-61884☆36Oct 14, 2025Updated 5 months ago
- ☆77Nov 13, 2025Updated 4 months ago
- ☆52Oct 1, 2025Updated 5 months ago
- Complete list of LPE exploits for Windows (starting from 2023)☆917Mar 13, 2026Updated 2 weeks ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A C# utility for interacting with SCOM☆97Dec 2, 2025Updated 3 months ago
- Laravel RCE Exploitation Toolkit☆57Nov 8, 2025Updated 4 months ago
- Execute shellcode via ASPNET compiler☆62Oct 2, 2025Updated 5 months ago
- CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overfl…☆53Jan 11, 2025Updated last year
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 3 months ago
- BurnWP Advanced Exploiter System instead Scanner & Custom Plugin for Pentester☆92Oct 5, 2025Updated 5 months ago
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 6 months ago
- Lab used for workshop and CTF☆509Feb 3, 2026Updated last month
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆475Mar 15, 2026Updated 2 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆165Jun 19, 2025Updated 9 months ago
- CF-Hero is a reconnaissance tool that uses multiple data sources to discover the origin IP addresses of Cloudflare-protected web applicat…☆1,784Jun 15, 2025Updated 9 months ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆417Feb 7, 2026Updated last month
- Complete Solution for VAPT/AppSec and Pentesting Guide: Web | Mobile | API | Thick Client | Source Code Review | DevSecOps | Wireless | …☆1,612Mar 1, 2026Updated 3 weeks ago
- sap netweaver 0day poc by shinyhunters (scattered lapsus$ hunters) affecting all 7.x CVE-2025-31324☆20Aug 15, 2025Updated 7 months ago
- Azure Post Exploitation Framework☆245Oct 27, 2025Updated 5 months ago
- A lightweight GPT model, trained to discover subdomains.☆355Dec 18, 2025Updated 3 months ago
- Shellcode injection using the Windows Debugging API☆177Jan 4, 2026Updated 2 months ago
- ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.☆508Mar 7, 2026Updated 3 weeks ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Search for all leaked keys/secrets using one regex! bugbounty☆183Mar 29, 2025Updated last year
- Glass Cage is a zero-click PNG-based RCE chain in iOS 18.2.1, bypassing LockDown mode protection by exploiting ImageIO (CVE-2025-43300), …☆33Jan 11, 2026Updated 2 months ago
- LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113☆515Jan 2, 2025Updated last year
- Detection for CVE-2025-61675, CVE-2025-61678 & CVE-2025-66039☆47Dec 15, 2025Updated 3 months ago
- AdaptixC2 is a highly modular advanced redteam toolkit☆2,866Mar 22, 2026Updated last week
- Obex – Blocking unwanted DLLs in user mode☆283Sep 18, 2025Updated 6 months ago
- Hells Hollow Windows 11 Rootkit technique to Hook the SSDT via Alt Syscalls☆219Aug 31, 2025Updated 6 months ago
- ☆63Jan 22, 2026Updated 2 months ago
- Local Privilege Escalation to Root via Sudo chroot in Linux☆458Jul 2, 2025Updated 8 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advance…☆572May 22, 2025Updated 10 months ago
- jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying se…☆497Jan 22, 2026Updated 2 months ago
- ☆57Nov 18, 2025Updated 4 months ago
- ☆51Nov 26, 2025Updated 4 months ago
- ↕️🤫 Stealth redirector for your red team operation security☆1,067Mar 1, 2026Updated 3 weeks ago
- Backport of SliverStager to work with DotNetToJScript for vba☆17Aug 9, 2024Updated last year
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,059Mar 10, 2026Updated 2 weeks ago