ThreatTrack | Shodan + ExploitDB + GitHub + NVD
☆17Jul 16, 2024Updated last year
Alternatives and similar repositories for ThreatTrack
Users that are interested in ThreatTrack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Oct 14, 2017Updated 8 years ago
- HP Data Protector Arbitrary Remote Command Execution☆11Aug 12, 2018Updated 7 years ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆36May 29, 2024Updated last year
- uCVE is a tool written in GO that allows to extract CVE's related to a specific software and version, obtaining a report in HTML format w…☆37Aug 13, 2025Updated 8 months ago
- Rubidea - Bind XSS Server to Steal cookies.☆14May 2, 2020Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆12Jun 12, 2021Updated 4 years ago
- ExchangeHound is a defensive BloodHound OpenGraph collector for on-prem Microsoft Exchange that maps mailbox delegation and Exchange priv…☆71Apr 17, 2026Updated 3 weeks ago
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆31Sep 30, 2019Updated 6 years ago
- Simple tool for exploiting JWT vulnerabilities☆14Dec 1, 2025Updated 5 months ago
- Nuclei Pre-Master Template Downloader☆23Aug 8, 2024Updated last year
- A full-fledged msfrpc library for Metasploit framework.☆13Aug 5, 2017Updated 8 years ago
- ☆10Jan 31, 2021Updated 5 years ago
- ☆13Jul 29, 2024Updated last year
- This repository contains various threat hunting tools written in Python and is documented in the series Python Threat Hunting Tools which…☆19Nov 16, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- List of sources for cybersecurity news☆41Dec 16, 2022Updated 3 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated 2 years ago
- The most powerfull Web Content Scanner☆125Jun 18, 2025Updated 10 months ago
- A malicious .cab creation tool for CVE-2021-40444☆13Sep 12, 2021Updated 4 years ago
- Official urlscan.io and urlscan Pro CLI tool☆35Apr 1, 2026Updated last month
- Hollywood-style CCTV hacking - PoC☆40May 30, 2020Updated 5 years ago
- CVE-2021-26084 - Confluence Pre-Auth RCE | OGNL injection☆21Sep 1, 2021Updated 4 years ago
- AISecLists - Your AI Red Teaming Arsenal. Discover a curated collection of prompt lists for diverse AI security assessments, including LL…☆15Jan 18, 2025Updated last year
- All my blogs for ExpDev, HTB, BinaryExploit, Etc.☆13Jul 17, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆24Mar 1, 2019Updated 7 years ago
- Simple command line integration to Chat GPT☆11Jan 23, 2023Updated 3 years ago
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆12Aug 14, 2025Updated 8 months ago
- Repository focused on advanced Red Team tools and techniques, mainly created with C. It contains projects I have created to understand ma…☆20Mar 23, 2026Updated last month
- Scraping darknet forums has been the object of research in the field of intelligence and security informatics. In this repository we scr…☆11May 18, 2023Updated 2 years ago
- Uma ferramenta WEB de segurança open source de redes de computadores com Nmap, honeypot, vulnerabilidade de equipamentos de rede etc.☆10Mar 15, 2021Updated 5 years ago
- Sighting DB is designed to scale writing and reading a count of attributes, tracking when if was first and last seen☆17Apr 11, 2024Updated 2 years ago
- Script to provision a curated set of pentesting tools into a Kali (supported) box.☆12Jul 10, 2021Updated 4 years ago
- A reference implementation for automatically deploying a full-featured IRC server with Let's Encrypt, Anope services, and more☆11Apr 24, 2018Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- String extraction and classification tool for binary files, designed to extract only the strings that can be considered relevant (i.e. no…☆11Aug 9, 2020Updated 5 years ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 3 years ago
- Simple chrome extension for full name extraction and conversion to emails/usernames. Utilizes the 'people' tab of the target company on L…☆29Apr 30, 2025Updated last year
- Display latest Cyber Security News within your PiMirror☆10Feb 23, 2021Updated 5 years ago
- 🌑 A dusty navy and teal color theme for Standard Notes and Listed.to☆16May 3, 2026Updated last week
- Simple Shellcode Runner in Rust Language☆18Dec 8, 2023Updated 2 years ago
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago