XiaomingX / awesome-cve-exp-pocLinks
A curated collection of CVE exploitation proof-of-concept (POC) codes and resources. This repository is designed for security researchers, ethical hackers, and enthusiasts to study and understand various CVE vulnerabilities and their exploitation methods. Always ensure responsible usage for educational and ethical purposes only.
☆12Updated 6 months ago
Alternatives and similar repositories for awesome-cve-exp-poc
Users that are interested in awesome-cve-exp-poc are comparing it to the libraries listed below
Sorting:
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE☆17Updated 7 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆27Updated 11 months ago
- A list of OSINT resources and tools that may be useful to you when conducting investigations related to the Democratic People's Republic …☆24Updated last month
- Yet another powerful payload encoder/decoder☆13Updated 3 years ago
- A script to automate keystrokes through a graphical desktop program.☆35Updated 2 weeks ago
- roadmap for being a self-taught hacker☆7Updated last year
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆17Updated 10 months ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆29Updated 3 years ago
- Enumeration & fingerprint tool☆25Updated last year
- A tool for injecting custom JavaScript payloads into PDF files for penetration testing and XSS proof-of-concept generation.☆12Updated 5 months ago
- List of groups that are carrying out cyber actions in the conflict between Israel and Iran.☆22Updated this week
- Quantum zero-day exploit Hunting for vulnerabilities as small as a quantum particle☆13Updated 2 weeks ago
- ☆11Updated 7 months ago
- This tool is intended to be used for on target enumeration to gather and exfiltrate information and then to upload tools such as netcat o…☆21Updated last year
- Auto exploitation tool for CVE-2024-24401.☆36Updated 9 months ago
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆15Updated last year
- Minimal web server enumeration & attack surface detection tool based on results of nmap.☆38Updated 9 months ago
- OpenAI Security Console - Python3 AI-powered Cybersecurity Framework☆17Updated 2 years ago
- Recon (Whois)☆15Updated 2 years ago
- ShoDam is a simple and effective bookmarklet designed to extract IP addresses from Shodan search results with a single click.☆11Updated 7 months ago
- A comprehensive web application security testing toolkit that combines 10 powerful penetration testing features into one tool.☆31Updated 2 months ago
- Script en Bash que automatiza todos los pasos para retransmitir la solicitud de autenticación SMB con el objetivo de obtener una Shell.☆26Updated last week
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆14Updated 6 months ago
- Seekolver is a tool focused on attack-surface mapping. It performs searches for subdomains associated with root domains and root domains …☆39Updated last year
- This is an AD pentest tools collection☆58Updated 11 months ago
- Awesome AI Tools for Game Development: A curated collection of the best AI tools, libraries, and resources to enhance game development wo…☆11Updated last month
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated 10 months ago
- Automated way to extract juicy info with subfinder and waybackurls☆34Updated last month
- uforall is a fast url crawler this tool crawl all URLs number of different sources, alienvault,WayBackMachine,urlscan,commoncrawl☆42Updated 6 months ago