☆28Aug 21, 2024Updated last year
Alternatives and similar repositories for CVE_Writeup
Users that are interested in CVE_Writeup are comparing it to the libraries listed below
Sorting:
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆18Sep 23, 2025Updated 5 months ago
- CVE-2024-30056 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability☆17May 27, 2024Updated last year
- ☆16Dec 7, 2025Updated 3 months ago
- ☆10Jan 8, 2018Updated 8 years ago
- Organize, track, and share vulnerability findings effortlessly. This Burp Suite extension integrates with Obsidian, offering a proven not…☆38Apr 5, 2025Updated 11 months ago
- QEMU modified to run CGC binaries.☆13Apr 12, 2022Updated 3 years ago
- AFL, modified to support multi-CB challenge sets for CGC.☆19Aug 20, 2016Updated 9 years ago
- ☆27Jul 11, 2022Updated 3 years ago
- A montage of ethical hacking based resources, please ensure you do not upload anything that violates copyright law☆12Nov 29, 2020Updated 5 years ago
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆57May 1, 2023Updated 2 years ago
- ☆16Aug 27, 2025Updated 6 months ago
- Fork of original wfuzz in order to keep it in Git☆42Mar 12, 2014Updated 12 years ago
- ☆16Jul 1, 2023Updated 2 years ago
- Practical Web Penetration Testing, published by Packt☆25Jan 30, 2023Updated 3 years ago
- ☆13Nov 29, 2024Updated last year
- Our backup exploitation technique: fuzzing for POVs!☆24Aug 20, 2016Updated 9 years ago
- ☆20Jul 18, 2019Updated 6 years ago
- Things we learned from Capture The Flag hacking competitions we participated in☆22Mar 15, 2021Updated 5 years ago
- ☆91Mar 17, 2025Updated last year
- RobotScraper is a simple tool written in Python to check each of the paths found in the robots.txt file and what HTTP response code they …☆14Jul 23, 2024Updated last year
- Tools to browse disk images and file system metadata in a web service☆24Jan 10, 2024Updated 2 years ago
- An automated bug hunting tool for comprehensive reconnaissance, including subdomain enumeration, port scanning, vulnerability detection, …☆13Jun 24, 2025Updated 8 months ago
- CSbyGB - Gabrielle B's new Blog!☆23Jul 29, 2025Updated 7 months ago
- ☆24Mar 2, 2026Updated 2 weeks ago
- ☆11Dec 17, 2023Updated 2 years ago
- Lists various tools used in hardware hacking.☆33Jan 25, 2026Updated last month
- A Simple CLI App to mark all EXCEL sheets visible (i.e. sets "Very Hidden" and "Hidden" to "Visible")☆11Apr 16, 2020Updated 5 years ago
- Google Dorks that can be used for penetration testing, security research, and information gathering.☆37Jan 25, 2026Updated last month
- In the spirit of #opendata, we publish our list (dangerous.domains) and a full change history here on GitHub, delayed by 6 hours. For liv…☆14Apr 19, 2025Updated 11 months ago
- Materiały do szkolenia Praktyczny Wireshark☆24Apr 17, 2024Updated last year
- A fully-fledged network of yester-year to teach long forgotten security techniques☆10Feb 15, 2026Updated last month
- This repository is tailored for participants of the Polish training course "Live Cold Boot Attack: How to Decrypt a Laptop by Freezing Me…☆21Mar 30, 2025Updated 11 months ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆50Jul 8, 2025Updated 8 months ago
- This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-up…☆81Mar 13, 2026Updated last week
- Burp request/response timer☆36Nov 8, 2017Updated 8 years ago
- A project aimed at automating and making repetitive tasks easy while pentesting , like creating msf payloads or a one-liner reverse shel…☆11Nov 14, 2022Updated 3 years ago
- list of useful commands, shells and notes related to OSCP☆26Mar 15, 2018Updated 8 years ago
- ☆21Sep 5, 2016Updated 9 years ago
- Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence☆77Oct 6, 2023Updated 2 years ago