blackhuntop / Ghost-CveView external linksLinks
GitHub CVE Repository Hunt
☆18Jul 23, 2024Updated last year
Alternatives and similar repositories for Ghost-Cve
Users that are interested in Ghost-Cve are comparing it to the libraries listed below
Sorting:
- Yandex browser password recovery☆11Apr 9, 2025Updated 10 months ago
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆29Jun 6, 2023Updated 2 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 5 years ago
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- DC540 hacking challenge 0x00002 [MicroPython CTF].☆12Nov 26, 2025Updated 2 months ago
- Cisco IOS Security Inspector☆39Dec 29, 2025Updated last month
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- BloodHound PowerShell client☆76Dec 10, 2025Updated 2 months ago
- Nqntnqnqmb transform maltego☆24Sep 19, 2020Updated 5 years ago
- MB Bank Balance Notifier là một ứng dụng iOS mô phỏng thông báo biến động số dư tài khoản MB Bank. Ứng dụng này giúp bạn kiểm tra và trải…☆13Jul 27, 2024Updated last year
- ☆19Aug 26, 2020Updated 5 years ago
- ☆44Apr 27, 2024Updated last year
- Decrypting yandex browser passwords☆27Apr 8, 2025Updated 10 months ago
- Repo for all my exploits/PoCs☆52May 6, 2025Updated 9 months ago
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆23May 15, 2024Updated last year
- This is a collection of Worms for educational purposes☆34Jul 17, 2025Updated 6 months ago
- ⛏️ A simple page to mine monero using Coin hive☆22Sep 7, 2020Updated 5 years ago
- Parent Process ID Spoofing, coded in CGo.☆24Apr 21, 2025Updated 9 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Jun 5, 2024Updated last year
- CVE-2024-30090 - LPE PoC☆108Oct 17, 2024Updated last year
- Turn speech to LaTeX using AI, 100% local in your browser☆28May 22, 2025Updated 8 months ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆22Aug 6, 2022Updated 3 years ago
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆27Mar 20, 2025Updated 10 months ago
- Qiwi у тебя в терминале! (Бета версия)☆11May 5, 2021Updated 4 years ago
- This is an open source Snort rules repository☆30May 31, 2022Updated 3 years ago
- DC540 hacking challenge 0x00001.☆26Nov 26, 2025Updated 2 months ago
- Unauthenticated Remote Code Execution via Angular-Base64-Upload Library☆26Jul 12, 2025Updated 7 months ago
- intrusion detection☆26Jun 14, 2017Updated 8 years ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆28Mar 26, 2023Updated 2 years ago
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆30Dec 12, 2024Updated last year
- CHAOS RAT web panel path RCE PoC☆30Apr 15, 2024Updated last year
- Cross-platform Search Engine and File Explorer for Multimedia☆31Feb 16, 2025Updated 11 months ago
- A CRYPTOJACKING PROGRAM (MALWARE) >:)☆39Sep 16, 2021Updated 4 years ago
- thc-ipv6 debian package (part of https://salsa.debian.org/pkg-security-team/thc-ipv6 as of 201607)☆34Aug 3, 2017Updated 8 years ago
- A minimal SDK that lets an integrator add a Monero Miner using the Javascript miner created by CoinHive. The Monero Miner can be used wit…☆26Jul 27, 2018Updated 7 years ago
- Capturing audio (.wav) from target using a link☆12Feb 21, 2020Updated 5 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- ⭕️💰 Network monitoring solution to detect crypto-mining on local machines.☆31Jun 27, 2018Updated 7 years ago
- Ready documents/procedures for successfully passing customs clearance in your country☆31Nov 20, 2023Updated 2 years ago