FastCVE: A Dockerized CVE search tool with API and CLI support for security vulnerability queries.
☆61Jan 2, 2026Updated 2 months ago
Alternatives and similar repositories for FastCVE
Users that are interested in FastCVE are comparing it to the libraries listed below
Sorting:
- Tool queries the OpenAI API to enhance the description, impact, and recommendation keys of a nuclei template.☆21Apr 1, 2023Updated 2 years ago
- vīlicus is a bug bounty api dashboard☆41Aug 13, 2023Updated 2 years ago
- Filter URLs that match your scope file for bugbounty.☆11May 23, 2023Updated 2 years ago
- Query various sources for CVE proof-of-concepts☆53Jun 1, 2023Updated 2 years ago
- ☆14Aug 9, 2021Updated 4 years ago
- A Go tool that gets the newest PRs from projectdiscovery/nuclei-templates.☆55Jun 13, 2023Updated 2 years ago
- Socks proxy server using powershell. Supports local and reverse connections for pivoting.☆11Oct 7, 2020Updated 5 years ago
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆11May 14, 2025Updated 9 months ago
- Script to identify new host using the subjectAltName (Subject Alternate Name) extension of a x509 HTTP TLS certificate.☆12Dec 25, 2020Updated 5 years ago
- Postfix SMTP Smuggling - Expect Script POC☆23Dec 26, 2023Updated 2 years ago
- Attack on a local network using an ARP vulnerability☆11Jan 12, 2022Updated 4 years ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆128Jul 7, 2022Updated 3 years ago
- PoC for CVE-2021-3129 (Laravel)☆12Oct 9, 2021Updated 4 years ago
- Crawlex is a powerful Chrome extension designed to assist bug bounty hunters in their work by enabling easy crawling of all possible URLs…☆12May 28, 2023Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Aug 30, 2022Updated 3 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Oct 25, 2021Updated 4 years ago
- Standalone Go implementation of Metasploit's "db_nmap" and "db_import" commands.☆19Nov 6, 2024Updated last year
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆22Nov 15, 2018Updated 7 years ago
- ☆17May 20, 2021Updated 4 years ago
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Aug 31, 2020Updated 5 years ago
- Finds Documents On Cloud Assets Using grayhatwarfare API for short urls☆23Mar 2, 2022Updated 4 years ago
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago
- Single-WebApp-Target essentials testing methodology tool starting at recon-information gathering for the juicy stuff ended up in exploita…☆23Jun 15, 2021Updated 4 years ago
- Track the sizes of different cloud providers☆26Updated this week
- Web CTF CheatSheet 🐈☆34Apr 10, 2019Updated 6 years ago
- Qiwi у тебя в терминале! (Бета версия)☆11May 5, 2021Updated 4 years ago
- Web API for nuclei and subfinder will help you automate your entire security testing workflow since you can host it anywhere and make it …☆61Sep 14, 2022Updated 3 years ago
- A collection of web browser CTF challenges and solutions.☆33Dec 30, 2022Updated 3 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Sep 7, 2021Updated 4 years ago
- Command-line tool to enumerate top-level domains, check response codes and find potential vulnerabilities for bug bounty hunters and secu…☆26Mar 6, 2023Updated 3 years ago
- Discover new target domains using Content Security Policy☆505Feb 7, 2026Updated 3 weeks ago
- Squey is an open-source cross-platform visualization software designed to interactively explore and understand large amounts of tabular d…☆35Dec 15, 2025Updated 2 months ago
- bash script for automating subdomain enumeration process either passive or active☆29Feb 24, 2026Updated last week
- Capturing audio (.wav) from target using a link☆12Feb 21, 2020Updated 6 years ago
- A wrapper around tools used for subdomain enumeration, to automate the workflow, on a given domain, written in bash.☆79Aug 2, 2022Updated 3 years ago
- Mapping from bug bounty and vulnerability disclosure programs to respective GitHub organizations☆85Feb 21, 2026Updated last week
- Tool to search possible emails indexed throught API's Hunter.io (https://hunter.io)☆31May 22, 2023Updated 2 years ago
- offensive security scripts and documentation☆30Dec 9, 2025Updated 2 months ago
- Open-source stealer logs parser and visualization dashboard that structures and presents log data to facilitate analysis.☆74Feb 26, 2026Updated last week