Repository of CVE found by OCD people
☆84Jun 19, 2025Updated 8 months ago
Alternatives and similar repositories for CVE-repository
Users that are interested in CVE-repository are comparing it to the libraries listed below
Sorting:
- A web front-end for password cracking and analytics☆16Jan 6, 2019Updated 7 years ago
- A library to enhance and speed up script/exploit writing for CTF players☆41Jul 8, 2020Updated 5 years ago
- A Nginx reverse proxy that authenticates users using their personal certificates. Includes everything to create and revoke those certific…☆29Mar 8, 2021Updated 5 years ago
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆25Feb 11, 2023Updated 3 years ago
- A CLI tool and library allowing to simply decode all kind of BigIP cookies.☆39Jul 7, 2020Updated 5 years ago
- 🌎 A command-line application to help determine the location information from a given ip address or url.☆21Mar 29, 2017Updated 8 years ago
- WMI Shell project : proof-of-concept of remote access to a Windows machine using only the WMI service.☆44Dec 27, 2018Updated 7 years ago
- A CLI tool to identify the hash type of a given hash.☆114Aug 26, 2022Updated 3 years ago
- ☆37Oct 3, 2023Updated 2 years ago
- Easy discovery of assets☆13Jun 22, 2022Updated 3 years ago
- Dominate the Active Directory game. An Active Directory environments pentest tool complementary to existing ones like NetExec.☆18Jan 10, 2026Updated last month
- Deploy multiple instances of Nessus in docker containers easily☆20Mar 31, 2021Updated 4 years ago
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆30Dec 12, 2024Updated last year
- Find the remote website version based on a git repository☆125Jun 1, 2021Updated 4 years ago
- Ease and assist the compromise of an Active Directory environment.☆31Sep 17, 2021Updated 4 years ago
- A standalone WMI protocol for CrackMapExec☆51Feb 3, 2020Updated 6 years ago
- Nmap Web Dashboard and Reporting☆34May 1, 2022Updated 3 years ago
- ☆24Nov 3, 2022Updated 3 years ago
- ☆33Jun 19, 2021Updated 4 years ago
- Internal Network Penetration Test Playbook☆20Jul 13, 2021Updated 4 years ago
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11May 6, 2023Updated 2 years ago
- Home of https://redteam.guide☆15Sep 19, 2022Updated 3 years ago
- Kentico <=12.0.14 is vulnerable to a remote code execution via the SyncServer☆10Sep 28, 2020Updated 5 years ago
- AtMail Email Server Appliance 6.4 - Exploit toolchain (XSS > CSRF > RCE)☆11Dec 8, 2022Updated 3 years ago
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.☆12Oct 9, 2024Updated last year
- Random HTTP User-Agent string generator☆11Oct 22, 2014Updated 11 years ago
- AiCSA,Move to https://github.com/hktalent/AiCSA☆10Apr 3, 2023Updated 2 years ago
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆31Jan 13, 2026Updated last month
- Add your configs for tmux☆18Apr 3, 2022Updated 3 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆10Jun 28, 2020Updated 5 years ago
- Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.☆28Mar 1, 2026Updated last week
- WAF bypass PoC☆50Oct 9, 2023Updated 2 years ago
- Cobalt Strike Aggressor script create for RTO☆16Apr 11, 2024Updated last year
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Aug 12, 2021Updated 4 years ago
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆12Mar 4, 2021Updated 5 years ago
- A multi coroutine concurrent batch URL survival detection tool written in Go, with concurrency determined by CPU by default.一个go编写的多协程并发批…☆12Jan 9, 2024Updated 2 years ago
- Unicode Security Toolkit☆21Mar 1, 2026Updated last week
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆16Apr 5, 2024Updated last year
- ☆11Oct 25, 2021Updated 4 years ago