Repository of CVE found by OCD people
☆84Jun 19, 2025Updated 9 months ago
Alternatives and similar repositories for CVE-repository
Users that are interested in CVE-repository are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of our CTF write-ups☆28Aug 7, 2020Updated 5 years ago
- A web front-end for password cracking and analytics☆16Jan 6, 2019Updated 7 years ago
- A library to enhance and speed up script/exploit writing for CTF players☆41Jul 8, 2020Updated 5 years ago
- A Nginx reverse proxy that authenticates users using their personal certificates. Includes everything to create and revoke those certific…☆29Mar 8, 2021Updated 5 years ago
- WMI Shell project : proof-of-concept of remote access to a Windows machine using only the WMI service.☆44Dec 27, 2018Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A CLI tool and library allowing to simply decode all kind of BigIP cookies.☆39Jul 7, 2020Updated 5 years ago
- ☆37Oct 3, 2023Updated 2 years ago
- A CLI tool to identify the hash type of a given hash.☆114Aug 26, 2022Updated 3 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Mar 31, 2021Updated 4 years ago
- A standalone WMI protocol for CrackMapExec☆51Feb 3, 2020Updated 6 years ago
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆25Feb 11, 2023Updated 3 years ago
- Easy discovery of assets☆13Jun 22, 2022Updated 3 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Jul 28, 2023Updated 2 years ago
- Dominate the Active Directory game. An Active Directory environments pentest tool complementary to existing ones like NetExec.☆19Mar 22, 2026Updated last week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- 🌎 A command-line application to help determine the location information from a given ip address or url.☆21Mar 29, 2017Updated 9 years ago
- Ease and assist the compromise of an Active Directory environment.☆31Sep 17, 2021Updated 4 years ago
- Find the remote website version based on a git repository☆125Jun 1, 2021Updated 4 years ago
- Nmap Web Dashboard and Reporting☆34May 1, 2022Updated 3 years ago
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.☆12Oct 9, 2024Updated last year
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆30Dec 12, 2024Updated last year
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆10Jun 28, 2020Updated 5 years ago
- ☆33Jun 19, 2021Updated 4 years ago
- Arsenal is just a quick inventory and launcher for hacking programs☆3,711Nov 29, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- AtMail Email Server Appliance 6.4 - Exploit toolchain (XSS > CSRF > RCE)☆11Dec 8, 2022Updated 3 years ago
- Spot all domain controllers in a Microsoft Active Directory environment. Find computer name, FQDN, and IP address(es) of all DCs.☆20Jun 23, 2024Updated last year
- SolarView Compact through 6.00 downloader.php commands injection (RCE) nuclei-templates☆15Jun 16, 2023Updated 2 years ago
- An exploit for CVE-2018-5955 GitStack 2.3.10 Unauthenticated RCE☆10Nov 15, 2024Updated last year
- Shared library loading application for Linux written in Go.☆16Aug 31, 2020Updated 5 years ago
- Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.☆28Mar 1, 2026Updated 3 weeks ago
- About PIVOting☆12Dec 19, 2023Updated 2 years ago
- POC for Veeam Backup and Replication CVE-2023-27532☆71Mar 28, 2023Updated 3 years ago
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆11Sep 22, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- NightWriter is a modern real-time collaborative editing tool secured by end-to-end encryption.☆18Oct 16, 2021Updated 4 years ago
- 👀CVE Simple List☆74Updated this week
- A repository of compiled and ready-to-use shells for Windows restricted environments.☆35Feb 19, 2020Updated 6 years ago
- Smersh is a pentest oriented collaborative tool used to track the progress of your company's missions.☆218Aug 26, 2024Updated last year
- Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)☆23Jul 23, 2024Updated last year
- Unicode Security Toolkit☆40Oct 7, 2024Updated last year
- ☆13Dec 7, 2022Updated 3 years ago