With the help of this automated script, you will never lose track of recently released CVEs.
☆52Feb 19, 2022Updated 4 years ago
Alternatives and similar repositories for CVE-Tracker
Users that are interested in CVE-Tracker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Carbon Black Response IR tool☆56Dec 10, 2020Updated 5 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- 🚪 Quick & dirty Wordpress Command Execution Shell☆66Jan 24, 2022Updated 4 years ago
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- Beacon payload using AV bypass method from https://github.com/fullmetalcache/CsharpMMNiceness and shellcode generated from https://github…☆20Feb 9, 2021Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Scrape Pastebin API to collect daily pastes, setup a wordlist and be alerted by email when you have a match.☆51Feb 5, 2025Updated last year
- 修改自官方yara工具☆14May 6, 2024Updated last year
- Wireless Intrusion Detection System for Hak5's WiFi Coconut☆31Apr 5, 2023Updated 3 years ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆47Dec 6, 2023Updated 2 years ago
- Use Windows Management Instrumentation interfaces to perform actions on a Windows system from a Linux System☆16Mar 15, 2012Updated 14 years ago
- JNDI命令注入利用☆12Oct 13, 2020Updated 5 years ago
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆195Feb 24, 2026Updated last month
- ☆13Mar 1, 2024Updated 2 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆106Feb 15, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆30Mar 23, 2026Updated 2 weeks ago
- ☆10Jun 15, 2024Updated last year
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆100Oct 27, 2024Updated last year
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Mar 9, 2021Updated 5 years ago
- Attack Surface Discovery tool built on a microservice approach, utilizing multi-threading for fast, internet-scale asset indexing☆255Dec 12, 2025Updated 4 months ago
- A python script which allows you to parse GeoLocation data from your Image files stored in a dataset.It also produces output in CSV file …☆42Dec 20, 2020Updated 5 years ago
- 安全卫士项目☆32Aug 4, 2017Updated 8 years ago
- 🌒 Shell command obfuscation to avoid detection systems☆122Oct 10, 2022Updated 3 years ago
- A collection of Script for Red Team & Incidence Response☆11Jun 30, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆179Nov 25, 2022Updated 3 years ago
- Materials for CVE-2024-30052.☆12Oct 4, 2024Updated last year
- ☆31Aug 29, 2022Updated 3 years ago
- Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token…☆163Dec 19, 2021Updated 4 years ago
- This tool is great for information gathering and post- exploitation☆16Jul 20, 2021Updated 4 years ago
- ☆19Jul 20, 2015Updated 10 years ago
- Hyper-V virtual switch packet capturing extension with libpcap / Wireshark format☆13Jun 3, 2014Updated 11 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆102May 11, 2022Updated 3 years ago
- ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabili…☆178Feb 14, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- This repository contains multiple exploits I have written for various CVEs and CTFs☆28Jul 27, 2025Updated 8 months ago
- ⚡ Create infinite UAC prompts forcing a user to run as admin ⚡☆248Sep 23, 2022Updated 3 years ago
- A python port of CCob's ThreadlessInject☆25Mar 18, 2023Updated 3 years ago
- Assist reverse tcp shells in post-exploration tasks☆222Oct 17, 2025Updated 5 months ago
- Simple Malware Scanner written in python☆90May 10, 2025Updated 11 months ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆145Mar 17, 2026Updated 3 weeks ago
- treafik fronted c2 examples☆25Dec 6, 2020Updated 5 years ago