☆23Oct 10, 2025Updated 5 months ago
Alternatives and similar repositories for ParrotEntorno
Users that are interested in ParrotEntorno are comparing it to the libraries listed below
Sorting:
- Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)☆15Jun 29, 2025Updated 8 months ago
- ☆12May 16, 2025Updated 9 months ago
- ☆13Apr 25, 2024Updated last year
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆18Mar 3, 2021Updated 5 years ago
- My Binary Exploitation's Course Practice challenge.☆18Oct 24, 2025Updated 4 months ago
- ☆15Apr 17, 2025Updated 10 months ago
- A script to init a docker with my pwn/reverse CTF tools.☆14Jan 25, 2025Updated last year
- A critical severity Remote Code Execution (RCE) vulnerability (CVE-2023-22527) was discovered in Confluence Server and Data Center.☆22Jan 23, 2024Updated 2 years ago
- Exploit for elevation of privilege vulnerability in QuickHeal's Seqrite EPS (CVE-2023-31497).☆18Oct 30, 2023Updated 2 years ago
- ☆19Dec 7, 2024Updated last year
- An Advanced Darkweb OSINT Tool☆24Jun 19, 2025Updated 8 months ago
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unli…☆43Jun 12, 2025Updated 8 months ago
- ☆293Oct 15, 2025Updated 4 months ago
- Nuclei template and information about the POC for CVE-2024-25600☆31Feb 21, 2024Updated 2 years ago
- Configuration files for desktop environment☆24Feb 20, 2024Updated 2 years ago
- ☆36Jan 8, 2026Updated 2 months ago
- ☆28Sep 11, 2023Updated 2 years ago
- WonderCMS Authenticated RCE - CVE-2023-41425☆25Dec 30, 2024Updated last year
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆36May 29, 2024Updated last year
- Linux kernel LPE practice with an NPD vulnerability☆36Jul 11, 2023Updated 2 years ago
- A tool to interact with Kerberos to request, forge and convert various types of tickets in an Active Directory environment.☆65Jun 10, 2025Updated 8 months ago
- CVE-2023-4634☆46Sep 7, 2023Updated 2 years ago
- ☆55Sep 13, 2022Updated 3 years ago
- Use-After-Free in Netfilter nf_tables when processing batch requests CVE-2023-32233☆49Jun 20, 2023Updated 2 years ago
- NemesisTools PowerFull Hacking Tools☆53Jan 8, 2025Updated last year
- ☆53Jun 22, 2025Updated 8 months ago
- A resource full of Crypto/OSINT tools, techniques and training courses for CTI, AML, and forensic investigations.☆122Mar 2, 2026Updated last week
- ☆59Dec 15, 2023Updated 2 years ago
- A tool that automates the search for IDOR vulnerabilities in web apps and APIs☆64Jan 18, 2021Updated 5 years ago
- Run WPS PIN attacks (Pixie Dust and bruteforce) on your Termux☆102Mar 12, 2025Updated 11 months ago
- Maximize your bug bounty hunting efficiency with exp0s3d - the open-source tool that automates initial reconnaissance and vulnerability d…☆88Mar 20, 2025Updated 11 months ago
- ☆76Aug 19, 2021Updated 4 years ago
- MobSF Remote code execution (via CVE-2024-21633)☆80Jan 7, 2024Updated 2 years ago
- ☆146Jun 9, 2025Updated 9 months ago
- A Bash script for automated nuclei dast scanning by using passive urls☆123Mar 5, 2025Updated last year
- CVE-2023-33733 reportlab RCE☆121Sep 5, 2023Updated 2 years ago
- Foxy contexts is a library for building context servers supporting Model Context Protocol☆113Nov 19, 2025Updated 3 months ago
- Lightweight text-based SQL parameter binds☆132Feb 12, 2026Updated 3 weeks ago
- Basic PoC for CVE-2023-27524: Insecure Default Configuration in Apache Superset☆111Sep 9, 2023Updated 2 years ago