GitHub CVE Repository Hunt
☆17Jul 23, 2024Updated last year
Alternatives and similar repositories for Ghost-Cve
Users that are interested in Ghost-Cve are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Yandex browser password recovery☆11Apr 9, 2025Updated last year
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆30Jun 6, 2023Updated 2 years ago
- ☆45Apr 27, 2024Updated 2 years ago
- DC540 hacking challenge 0x00002 [MicroPython CTF].☆14Nov 26, 2025Updated 5 months ago
- An 💦 orgasmic 💦 Python library for the Docker Engine API 🥵☆13Jan 13, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- PwnPI, skip all the errors while installing PwnPI on your RPI3, just follow the README.☆13May 19, 2017Updated 8 years ago
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- BloodHound PowerShell client☆81Mar 31, 2026Updated last month
- MB Bank Balance Notifier là một ứng dụng iOS mô phỏng thông báo biến động số dư tài khoản MB Bank. Ứng dụng này giúp bạn kiểm tra và trải…☆13Jul 27, 2024Updated last year
- This is a collection of Worms for educational purposes☆36Jul 17, 2025Updated 9 months ago
- A Python script to authenticate and test access to Google Cloud Platform (GCP) resources.☆17Jan 31, 2024Updated 2 years ago
- Unauthenticated Remote Code Execution via Angular-Base64-Upload Library☆26Jul 12, 2025Updated 9 months ago
- Repo for all my exploits/PoCs☆52May 6, 2025Updated last year
- LLVM-based ROP obfuscated compiler☆12Mar 24, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 6 years ago
- Airgapped ECC text messenger☆39Nov 28, 2025Updated 5 months ago
- ☆19Aug 26, 2020Updated 5 years ago
- MCP Client which serves as bridge between mcp servers and local LLMs running on Ollama, Created for MCP Servers Developed by Me, However …☆100Sep 16, 2025Updated 7 months ago
- Cisco IOS Security Inspector☆39Dec 29, 2025Updated 4 months ago
- A small end-to-end prober and Prometheus stats exporter for a Matrix homeserver☆11Oct 26, 2023Updated 2 years ago
- This is a opensource repo about how to detect android malware using Random Forest Classifier and explain it use linearsvc.☆12Feb 7, 2024Updated 2 years ago
- Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report☆10Nov 28, 2024Updated last year
- just for fun☆18Jan 21, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- I am still working on it☆11Apr 30, 2020Updated 6 years ago
- repo about binary exploitation☆11Dec 5, 2023Updated 2 years ago
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆23May 15, 2024Updated last year
- Burp Suite extension designed to help security professionals search for custom sensitive information in HTTP responses☆10Apr 25, 2023Updated 3 years ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆49Nov 17, 2025Updated 5 months ago
- Solana Copy Trading Bot, This Solana copy trading bot uses gRPC and ShredStream for ultra-low latency. 0 block auto copy trading, frontru…☆21Aug 4, 2025Updated 9 months ago
- Get ports,vulnerabilities,informations,banners,..etc for any IP with Shodan (no apikey! no rate-limit!)☆24Jun 3, 2020Updated 5 years ago
- Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulat…☆209May 22, 2025Updated 11 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Jun 5, 2024Updated last year
- Automated Google Dorking Tool. Generates and runs advanced search queries for exposed files. It also test Vulns, Analyzes and extracts me…☆121May 1, 2026Updated last week
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆51Feb 2, 2026Updated 3 months ago
- C# API for Nidhogg rootkit☆21Apr 25, 2024Updated 2 years ago
- Decrypting yandex browser passwords☆29Apr 8, 2025Updated last year
- Material from ICS Village talk at DEFCON 25☆13Jul 30, 2018Updated 7 years ago