☆28Aug 21, 2024Updated last year
Alternatives and similar repositories for CVE_Writeup
Users that are interested in CVE_Writeup are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2024-30056 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability☆17May 27, 2024Updated last year
- CTF pwnable cheatsheet☆20Feb 15, 2018Updated 8 years ago
- POV templates and compilation support for CGC binaries.☆10May 19, 2022Updated 3 years ago
- ☆10Jan 8, 2018Updated 8 years ago
- 🛡️ The Ultimate Cybersecurity Library | 160+ curated books, guides & resources covering Ethical Hacking, Penetration Testing, Bug Bounty…☆60Mar 5, 2026Updated last month
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Organize, track, and share vulnerability findings effortlessly. This Burp Suite extension integrates with Obsidian, offering a proven not…☆39Apr 5, 2025Updated last year
- ☆27Jul 11, 2022Updated 3 years ago
- A montage of ethical hacking based resources, please ensure you do not upload anything that violates copyright law☆12Nov 29, 2020Updated 5 years ago
- Capybara + RSpec project showcasing basic features of Capybara. For Introduction to Capybara course as part of Test Automation University…☆17Sep 28, 2023Updated 2 years ago
- ☆16Aug 27, 2025Updated 8 months ago
- ☆16Jul 1, 2023Updated 2 years ago
- ☆13Nov 29, 2024Updated last year
- A powerful Go tool for finding origin IPs of domains by querying multiple security APIs and validating results with built-in HTTP client.☆44Dec 4, 2025Updated 4 months ago
- Things we learned from Capture The Flag hacking competitions we participated in☆22Mar 15, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Proof-of-Concept for Authorization Bypass in Next.js Middleware☆19Mar 23, 2025Updated last year
- Easy automated vagrant provisioning of Windows 10 with flarevm tools installed for Digital Forensics and Malware Analysis Lab.☆20May 29, 2022Updated 3 years ago
- RobotScraper is a simple tool written in Python to check each of the paths found in the robots.txt file and what HTTP response code they …☆14Jul 23, 2024Updated last year
- CSbyGB - Gabrielle B's new Blog!☆23Jul 29, 2025Updated 9 months ago
- ☆16Apr 17, 2025Updated last year
- ☆24Mar 29, 2026Updated last month
- Stable linux kernel patched for gaming☆21Jun 1, 2025Updated 11 months ago
- ☆11Dec 17, 2023Updated 2 years ago
- An automated bug hunting tool for comprehensive reconnaissance, including subdomain enumeration, port scanning, vulnerability detection, …☆15Jun 24, 2025Updated 10 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- NeuralinkLLM is an open-source project dedicated to creating a robust interface for interacting and connecting your Brain via NeuralinkGP…☆12Sep 28, 2024Updated last year
- A Simple CLI App to mark all EXCEL sheets visible (i.e. sets "Very Hidden" and "Hidden" to "Visible")☆11Apr 16, 2020Updated 6 years ago
- In the spirit of #opendata, we publish our list (dangerous.domains) and a full change history here on GitHub, delayed by 6 hours. For liv…☆14Apr 19, 2025Updated last year
- Web page preview and analysis tool☆12Jan 11, 2023Updated 3 years ago
- ☆12Dec 26, 2022Updated 3 years ago
- Script to setup a phishing server on the cloud☆13Apr 30, 2021Updated 5 years ago
- This repository is tailored for participants of the Polish training course "Live Cold Boot Attack: How to Decrypt a Laptop by Freezing Me…☆21Mar 30, 2025Updated last year
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆50Jul 8, 2025Updated 9 months ago
- Introducing the Ransomware Builder – an educational tool with a sleek, modern GUI that makes it easy for anyone to create their own ranso…☆18Aug 4, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-up…☆85Mar 13, 2026Updated last month
- Burp request/response timer☆37Nov 8, 2017Updated 8 years ago
- The online version of Ciphey☆18Oct 11, 2023Updated 2 years ago
- please go to angr/patcherex instead of this!☆32Sep 27, 2018Updated 7 years ago
- A project aimed at automating and making repetitive tasks easy while pentesting , like creating msf payloads or a one-liner reverse shel…☆11Nov 14, 2022Updated 3 years ago
- markdown-pages.js - simple Markdown-based static sites, without the generator☆31Mar 31, 2026Updated last month
- ☆21Sep 5, 2016Updated 9 years ago