The Common Vulnerabilities Exposures (CVE) Database
☆35Dec 19, 2024Updated last year
Alternatives and similar repositories for CVE_Database
Users that are interested in CVE_Database are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple Ransomware Generator☆53Oct 5, 2024Updated last year
- Tool for CVE-2022-1388☆13May 13, 2022Updated 4 years ago
- 99% Bypassed Litespeed Server / 403 Forbidden☆16Jul 1, 2023Updated 2 years ago
- CyberPanel 2.3.6 pre-auth RCE☆40Oct 27, 2024Updated last year
- GENERATE PYTHON BASED FUD STUB☆22Nov 20, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- My GitHub profile☆12Feb 19, 2025Updated last year
- patch to apply to a netbox installation to add beautiful topology view to sites☆13Mar 21, 2019Updated 7 years ago
- Burp Suite extension to discover assets from HTTP response.☆18May 18, 2021Updated 5 years ago
- LazyRev for Lazy People☆21Jul 5, 2023Updated 2 years ago
- A comprehensive OSINT (Open Source Intelligence) script that gathers detailed information about a target domain using various public sour…☆19May 19, 2024Updated 2 years ago
- Brute Force subdomains with a list of custom DNS records.☆13Feb 24, 2023Updated 3 years ago
- ☆18Jan 8, 2025Updated last year
- A Python program to cut segments of a video based on specified keywords using OpenAI Whisper.☆13May 2, 2024Updated 2 years ago
- Nuclei Pre-Master Template Downloader☆23Aug 8, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- PHP CGI Argument Injection vulnerability☆33Jan 24, 2026Updated 3 months ago
- ☆17Apr 28, 2023Updated 3 years ago
- A small command-line utility to artificially limit the input rate to STDIN.☆18Feb 14, 2024Updated 2 years ago
- A Rust-based transparent Tor proxy that routes all system traffic through the Tor network enhanced security, proper DNS isolation, and mo…☆18Jan 25, 2026Updated 3 months ago
- Simple python3 script to automate CVE-2018-9995☆11Feb 20, 2024Updated 2 years ago
- Confluence Unauthorized Administrator User Addition Exploitation Script☆25Mar 26, 2026Updated last month
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆18May 7, 2024Updated 2 years ago
- Python Scanner and Exploiter of Remote File Inclusion Vulnerabilitie☆13Jan 6, 2022Updated 4 years ago
- Wait...☆31Mar 6, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Deepfakes Software For All☆10Feb 21, 2020Updated 6 years ago
- QC: Quantum Computing Simulator for C☆12Apr 8, 2024Updated 2 years ago
- Scripts and outputs for ATLAS data in STIX JSON and ATT&CK Navigator layer formats☆32Apr 30, 2026Updated 3 weeks ago
- to find shell backdoor in website☆17Jun 3, 2023Updated 2 years ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆57Nov 10, 2024Updated last year
- A BOF to create a scheduled task using a COM object.☆18Dec 3, 2024Updated last year
- Multiplatform Python WebShell☆320Nov 24, 2025Updated 5 months ago
- Image Sorting and Classification via Text Detection and Recognition☆14Dec 2, 2019Updated 6 years ago
- Detect Program Bug Bounty☆42Jun 12, 2025Updated 11 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Script for Reconnaissance(Bug Bounty)☆18May 15, 2022Updated 4 years ago
- This script make any windows compatible with RDP connection☆22Jul 28, 2025Updated 9 months ago
- Tool for Active Directory Certificate Services enumeration and abuse☆13Oct 7, 2024Updated last year
- This repo contains deobfuscated files of the Redline malware code which was behind the The recent Github Account hacks and stealing sensi…☆15Sep 18, 2024Updated last year
- https://english.ncsc.nl/contact/reporting-a-vulnerability-cvd☆21Feb 17, 2022Updated 4 years ago
- Aplikasi Sederhana Untuk Manajemen Pembayaran Pada Usaha Percetakan☆10Aug 30, 2015Updated 10 years ago
- OrqueIO main source code repository☆25Apr 24, 2026Updated 3 weeks ago