Ls4ss / ThreatTrackView external linksLinks
ThreatTrack | Shodan + ExploitDB + GitHub + NVD
☆17Jul 16, 2024Updated last year
Alternatives and similar repositories for ThreatTrack
Users that are interested in ThreatTrack are comparing it to the libraries listed below
Sorting:
- ☆13Oct 14, 2017Updated 8 years ago
- ☆13Nov 22, 2022Updated 3 years ago
- Material do curso de Hardware Hacking da ACADITI☆23Jan 13, 2020Updated 6 years ago
- uCVE is a tool written in GO that allows to extract CVE's related to a specific software and version, obtaining a report in HTML format w…☆36Aug 13, 2025Updated 6 months ago
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆31Sep 30, 2019Updated 6 years ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆36May 29, 2024Updated last year
- Hollywood-style CCTV hacking - PoC☆39May 30, 2020Updated 5 years ago
- AISecLists - Your AI Red Teaming Arsenal. Discover a curated collection of prompt lists for diverse AI security assessments, including LL…☆12Jan 18, 2025Updated last year
- List of sources for cybersecurity news☆41Dec 16, 2022Updated 3 years ago
- PoC for CVE-2022-40684 - Authentication bypass lead to Full device takeover (Read-only)☆87Oct 13, 2022Updated 3 years ago
- AES Ransomware in batch☆11Jun 25, 2024Updated last year
- ☆13Jul 29, 2024Updated last year
- Moonton Dump + Checker Email Password☆20Jul 18, 2021Updated 4 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- 🚀 IRIS-SOAR: Modular SOAR (Security Orchestration, Automation, and Response) implementation in Python. Designed to complement DFIR-IRIS …☆13Mar 27, 2024Updated last year
- One-click bookmarklet que acha AWS, Azure, Stripe, Firebase, JWT e chaves de alta entropia em qualquer app em 10 segundos☆39Dec 19, 2025Updated last month
- Polymorphic Virus in Python☆10Feb 8, 2023Updated 3 years ago
- ☆11Feb 6, 2019Updated 7 years ago
- UniFi 5 Controller for Raspberry Pi☆13Jan 31, 2018Updated 8 years ago
- It's only hitting vulnerable path in termdd.sys!!! NOT DOS☆12May 19, 2019Updated 6 years ago
- Let Unifi Guests check voucher data bundle left☆10Nov 13, 2017Updated 8 years ago
- String extraction and classification tool for binary files, designed to extract only the strings that can be considered relevant (i.e. no…☆10Aug 9, 2020Updated 5 years ago
- Get latest Exploit Databases notification on your Desktop☆16Jan 29, 2020Updated 6 years ago
- Display latest Cyber Security News within your PiMirror☆10Feb 23, 2021Updated 4 years ago
- ☆10Jan 31, 2021Updated 5 years ago
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- Sharpen your data science and cybersecurity skills by doing a project with open datasets☆10Jun 9, 2020Updated 5 years ago
- HP Data Protector Arbitrary Remote Command Execution☆11Aug 12, 2018Updated 7 years ago
- Conti V3 source code updated☆11Jun 30, 2022Updated 3 years ago
- Automatic cloud backup of Kali Linux data☆12Feb 27, 2020Updated 5 years ago
- Script to provision a curated set of pentesting tools into a Kali (supported) box.☆12Jul 10, 2021Updated 4 years ago
- ☆10Feb 26, 2023Updated 2 years ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- This project is used to create a web server running on the orchestrator to provide a Website interface to control and feed back display f…☆12Dec 30, 2021Updated 4 years ago
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract text…☆12Feb 5, 2026Updated last week
- Simple web app to track OWASP WSTG security testing progress☆27Sep 12, 2025Updated 5 months ago
- Simple command line integration to Chat GPT☆11Jan 23, 2023Updated 3 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Dec 11, 2025Updated 2 months ago