💎 Vulnerability assessment and vulnerability intelligence tool searching for vulnerabilities and exploits using keywords across multiple sources.
☆36Nov 12, 2025Updated 5 months ago
Alternatives and similar repositories for cveseeker
Users that are interested in cveseeker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 💠 Documented and undocumented WinAPI search.☆21Jul 22, 2025Updated 8 months ago
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- 寻找可注入进程☆13Jul 16, 2020Updated 5 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆31Feb 7, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆20Apr 10, 2025Updated last year
- Kaze's openly available CVE vulnerability data.☆16Apr 7, 2025Updated last year
- The difference between exploitation prediction and detection is akin to the difference between detecting a missile launch or a detonation…☆13Apr 11, 2026Updated last week
- ⚔️ Red Team tools for capturing credentials & planting payloads using native Windows features.☆13Jan 25, 2026Updated 2 months ago
- Search the ExploitDB with a little more control☆22Jun 4, 2017Updated 8 years ago
- Control Center module to run a shell script☆14Feb 24, 2020Updated 6 years ago
- ☆22Aug 16, 2025Updated 8 months ago
- Restores firmware and filesystem to iPhone/iPod Touch☆28Nov 24, 2013Updated 12 years ago
- Update all Zabbix templates☆64Mar 17, 2026Updated last month
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A tool to generate datasets and models based on vulnerabilities descriptions from @Vulnerability-Lookup.☆25Updated this week
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated 2 years ago
- Pivpn.io website content and configuration files☆11May 27, 2024Updated last year
- Structured CSVs and table schemas extracted from the 29-April-2025 LockBit affiliate-panel database leak.☆28May 8, 2025Updated 11 months ago
- combo lists for dev testing☆11Jan 15, 2019Updated 7 years ago
- tsh多终端代理通信☆19Feb 26, 2025Updated last year
- Config files for my GitHub profile.☆14Jan 16, 2024Updated 2 years ago
- One-header configurable C++20 COFF loader☆19Jul 21, 2025Updated 8 months ago
- ☆26Aug 11, 2025Updated 8 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- reverse engineered and improved BSQLi script from Coffinxp☆15Aug 30, 2024Updated last year
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Apr 4, 2022Updated 4 years ago
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆34Updated this week
- Wireshark Packet Analyzer with MCP Integration This project integrates the MCP (Message Communication Protocol) server with Wireshark to…☆22Mar 31, 2025Updated last year
- MCP Server that integrates with Security Copilot, Sentinel and other tools (in the future). It enhance the process of developing , testin…☆22Oct 8, 2025Updated 6 months ago
- Code coverage calculation/monitoring tool for Corpus Distillation☆16Aug 25, 2016Updated 9 years ago
- Experiment in implementation of an instrumentation for American Fuzzy Lop using DynamoRIO☆15Jul 29, 2017Updated 8 years ago
- A red teaming attack paradigm against AI Agents☆33Mar 9, 2025Updated last year
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Jul 25, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆26Jan 23, 2025Updated last year
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Mar 16, 2018Updated 8 years ago
- Build sneaky & malicious LNK files.☆161Jul 16, 2025Updated 9 months ago
- A Python3 CLI application that allows to upload articles written in Markdown to draft blog posts in Ghost☆11Apr 5, 2019Updated 7 years ago
- Cross Compatible Command and Control☆47Dec 18, 2025Updated 4 months ago
- Octant is a novel platform for experiments in participatory public goods funding, centered on Golem's native ERC-20 token, GLM.☆16Updated this week