Vip3r-MC / VulnVaultLinks
A curated collection of CVEs, tools 🛠️, and scripts 📜 for vulnerability research, exploit testing, and cybersecurity analysis—perfect for security researchers, penetration testers, and ethical hackers
☆13Updated last month
Alternatives and similar repositories for VulnVault
Users that are interested in VulnVault are comparing it to the libraries listed below
Sorting:
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆106Updated last year
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆42Updated 4 months ago
- Tools and Resources for Physical Security Red Teaming☆32Updated 3 months ago
- ☆10Updated 7 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 9 months ago
- A small executable to trick a user to authenticate using code matching MFA☆69Updated last year
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated 2 years ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆39Updated last year
- A structured red-team prompt for generating ethical hacking tools using AI - designed for use in labs, CTFs, and authorized security asse…☆18Updated 3 weeks ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- Vast.ai Password Kracking☆76Updated last month
- ☆23Updated 4 months ago
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆48Updated last month
- A comprehensive web application security testing toolkit that combines 10 powerful penetration testing features into one tool.☆32Updated 2 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆62Updated 10 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆78Updated 10 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆101Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- Social Engineering Browser Update Attack.☆56Updated last year
- Top 400 passwords as per HaveIBeenPwned☆22Updated 9 months ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆34Updated last year
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.☆22Updated 3 months ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆72Updated 3 weeks ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆51Updated 4 months ago
- Basic script to generate reverse shell payloads, generally most used in ctf.☆28Updated last year
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆21Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 8 months ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆49Updated 4 months ago
- A user enumeration tool for Slack.☆30Updated last year
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Updated last year