cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com
☆38Aug 30, 2022Updated 3 years ago
Alternatives and similar repositories for cvetrends
Users that are interested in cvetrends are comparing it to the libraries listed below
Sorting:
- nxdomain subdomain enumeration☆10Jul 17, 2022Updated 3 years ago
- Automated compromise detection of the world's most popular packages☆17Sep 25, 2023Updated 2 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆22Aug 6, 2022Updated 3 years ago
- CLI tool for filtering URLs/IPs with automatically-updated Bug Bounty program scope rules.☆34Dec 31, 2025Updated 2 months ago
- ☆16May 9, 2016Updated 9 years ago
- ☆10Dec 8, 2022Updated 3 years ago
- A gitleaks config that has most of Microsoft's deprecated credscan rules ported to it.☆13Apr 3, 2022Updated 3 years ago
- ☆13Oct 24, 2024Updated last year
- Advanced test for proxy & waf☆14Feb 10, 2026Updated 3 weeks ago
- ☆54Jan 22, 2025Updated last year
- Secrets detection based on regular expressions.☆22Apr 15, 2025Updated 10 months ago
- Crawlex is a powerful Chrome extension designed to assist bug bounty hunters in their work by enabling easy crawling of all possible URLs…☆12May 28, 2023Updated 2 years ago
- ☆12Apr 14, 2021Updated 4 years ago
- PoC for CVE-2021-3129 (Laravel)☆12Oct 9, 2021Updated 4 years ago
- OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.☆21Nov 9, 2023Updated 2 years ago
- POC for scanning ProxyShell(CVE-2021-34523,CVE-2021-34473,CVE-2021-31207)☆16Oct 6, 2021Updated 4 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago
- This repository contains complete source code for setting up the environment and exploit code for the vulnerability.☆19Mar 23, 2023Updated 2 years ago
- Your wise, big-eyed Youtube assistant.☆15Nov 13, 2024Updated last year
- This repo contains scripts i used while bug bounty.☆16Nov 4, 2020Updated 5 years ago
- Looks for parameters in urls☆34Oct 14, 2024Updated last year
- Solutions to crackmes☆19May 22, 2015Updated 10 years ago
- Techniques / Tips and tricks for finding sensitive data exposures in Github for Penetration Testers / Bug Bounty Hunters☆17Aug 1, 2020Updated 5 years ago
- A Burp Suite extension for GraphQL security testing.☆57Feb 7, 2026Updated 3 weeks ago
- Assistant for WSJT-X☆23Updated this week
- Automated Recon Tool Installer☆16Jun 29, 2022Updated 3 years ago
- the metasploit script(POC/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerability☆22Oct 2, 2021Updated 4 years ago
- filter net requests according to source, destination and type☆18Oct 5, 2025Updated 5 months ago
- Passively check for XSS character encodings☆18Updated this week
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Feb 6, 2022Updated 4 years ago
- parse ffuf & map endpoints to wordlists☆21Feb 25, 2021Updated 5 years ago
- DVRPi is a RaspberryPi 4B firmware designed to teach hardware hacking through intentional vulnerabilities.☆42Nov 3, 2025Updated 4 months ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆123Apr 14, 2023Updated 2 years ago
- Automated exploitation of MSSQL servers at scale☆127Feb 21, 2026Updated last week
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆128Jul 7, 2022Updated 3 years ago
- Covert data exfiltration via DNS☆51Feb 8, 2025Updated last year
- Damn Vulnerable Browser Extension (DVBE), previously named as Badly Coded Browser Extension (BCBE), is an open-source vulnerable Chrome E…☆33Mar 4, 2025Updated last year
- A powerful command-line tool for Google dorking, enabling users to uncover hidden information and vulnerabilities with advanced search qu…☆32Updated this week
- A powerful tool designed for identifying hidden endpoints and sensitive information within JavaScript files on a website.☆30Oct 19, 2023Updated 2 years ago