An easy to grep dump of the NVD database showing only; CVE-ID, CVSS Risk Score, and Summary.
☆56May 5, 2022Updated 3 years ago
Alternatives and similar repositories for cve-offline
Users that are interested in cve-offline are comparing it to the libraries listed below
Sorting:
- ☆14Mar 31, 2018Updated 7 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Jun 11, 2024Updated last year
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- "HeaderScan" Burp Plugin☆16Apr 26, 2014Updated 11 years ago
- Small python script wrapper for automating hashcat commands☆38Dec 20, 2020Updated 5 years ago
- A collection of source code, binaries, and compilation scripts designed to bypass detection☆25Jan 8, 2023Updated 3 years ago
- KiMi 漏洞感知机器人扫描框架 @KiMi-VulnBot @KiMiThreatPerception☆23Jul 25, 2017Updated 8 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- another nmap summarising script☆26Oct 1, 2020Updated 5 years ago
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago
- AMSI detection PoC☆31Apr 14, 2020Updated 5 years ago
- ☆21Oct 9, 2017Updated 8 years ago
- ☆20Aug 21, 2021Updated 4 years ago
- Burp extension to passively scan for applications revealing software version numbers☆33May 30, 2024Updated last year
- Collection of tools to interact with Intigriti website☆17Aug 10, 2024Updated last year
- aggregated repo for all conferences and talks I am giving☆17Oct 30, 2021Updated 4 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Writeups and solutions for RC3CTF 2016☆14Nov 23, 2016Updated 9 years ago
- ZAP test code☆14May 7, 2015Updated 10 years ago
- Blind XSS SVG☆10Mar 27, 2023Updated 2 years ago
- ProXBBE (Protocol eXtraction By Binary Execution)☆31Sep 21, 2017Updated 8 years ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 2 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated 9 months ago
- Subdomain finder☆10Mar 13, 2025Updated last year
- Google Hack Database Web Site Scrapper w/ DB updater utility. ASP.NET MVC web utility and Windows application for generating google hack …☆11Jun 23, 2016Updated 9 years ago
- offensive notes & resources☆43Apr 7, 2025Updated 11 months ago
- The pentest companion☆15Sep 1, 2021Updated 4 years ago
- Hashcat module that can crack a password used to derive an AES-128 key with CryptDeriveKey from CryptoAPI☆42Aug 29, 2023Updated 2 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Sep 11, 2020Updated 5 years ago
- A tool to run nmap against each line in a script.☆17Jan 3, 2021Updated 5 years ago
- An example MS-W32T client to show how to use midl.exe in a project managed by CMake☆11Feb 25, 2023Updated 3 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆71Nov 14, 2020Updated 5 years ago
- Python Package for burprestapi☆17Dec 27, 2019Updated 6 years ago
- Take a list of IP addresses and probe for working HTTP and HTTPS servers☆12Mar 12, 2020Updated 6 years ago
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆15Aug 2, 2021Updated 4 years ago
- 🦑 A friendly Ruby API to iptables.☆15May 6, 2017Updated 8 years ago
- Repository which contains a set of examples used in real phishing emails. Numerous parts of these examples will be highlighted to illustr…☆17Aug 18, 2021Updated 4 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆34Mar 4, 2024Updated 2 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Apr 9, 2025Updated 11 months ago