π Vulnerability assessment and vulnerability intelligence tool searching for vulnerabilities and exploits using keywords across multiple sources.
β36Nov 12, 2025Updated 4 months ago
Alternatives and similar repositories for cveseeker
Users that are interested in cveseeker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerabilityβ24Feb 5, 2025Updated last year
- Experimental python3.x based ICMP bind shell listener using scapy and windows 'compatible'β10May 29, 2020Updated 5 years ago
- ε―»ζΎε―注ε ₯θΏη¨β13Jul 16, 2020Updated 5 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object tβ¦β13Feb 4, 2024Updated 2 years ago
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.β31Feb 7, 2025Updated last year
- Managed Database hosting by DigitalOcean β’ AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- β20Apr 10, 2025Updated 11 months ago
- [EMNLP 2024] Holistic Automated Red Teaming for Large Language Models through Top-Down Test Case Generation and Multi-turn Interactionβ17Nov 9, 2024Updated last year
- Kaze's openly available CVE vulnerability data.β16Apr 7, 2025Updated 11 months ago
- A Programmerβ14Dec 20, 2025Updated 3 months ago
- βοΈ Red Team tools for capturing credentials & planting payloads using native Windows features.β12Jan 25, 2026Updated 2 months ago
- β22Aug 16, 2025Updated 7 months ago
- Update all Zabbix templatesβ63Mar 17, 2026Updated last week
- A tool to generate datasets and models based on vulnerabilities descriptions from @Vulnerability-Lookup.β23Updated this week
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.β10Apr 8, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI β’ AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Structured CSVs and table schemas extracted from the 29-April-2025 LockBit affiliate-panel database leak.β28May 8, 2025Updated 10 months ago
- Pivpn.io website content and configuration filesβ11May 27, 2024Updated last year
- How to bypass AMSI (Antimalware Scan Interface) in PowerShell/C++ by dynamically patching the AmsiScanBuffer function.β27Apr 21, 2025Updated 11 months ago
- Assembly MSX Z80 Code for ROM Games by ThePetsMode using ASMSX assemblerβ10Jan 19, 2025Updated last year
- Config files for my GitHub profile.β13Jan 16, 2024Updated 2 years ago
- Weaponize.it is your go-to resource for gaining insights into pentesting, bug bounty hunting, and scripting.β12Apr 3, 2025Updated 11 months ago
- β26Aug 11, 2025Updated 7 months ago
- reverse engineered and improved BSQLi script from Coffinxpβ15Aug 30, 2024Updated last year
- A tool to BruteForce ssh. An upgraded version of Hydra. Multiple bruteforce optionsβ12Jul 9, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- β26Dec 29, 2021Updated 4 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell anβ¦β21Apr 4, 2022Updated 3 years ago
- Identifies LOLDrivers that are not blocked by the active HVCI policy β ideal for BYOVD scenarios.β34Feb 1, 2026Updated last month
- MCP Server that integrates with Security Copilot, Sentinel and other tools (in the future). It enhance the process of developing , testinβ¦β20Oct 8, 2025Updated 5 months ago
- Code coverage calculation/monitoring tool for Corpus Distillationβ16Aug 25, 2016Updated 9 years ago
- Experiment in implementation of an instrumentation for American Fuzzy Lop using DynamoRIOβ15Jul 29, 2017Updated 8 years ago
- UNMAINTAINED - Vulnerability scanner and information gatherer for the Concrete5 CMSβ20Sep 17, 2020Updated 5 years ago
- A red teaming attack paradigm against AI Agentsβ32Mar 9, 2025Updated last year
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Servβ¦β29Jul 25, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean β’ AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- β26Jan 23, 2025Updated last year
- Hundred Days of Yara Challengeβ12Jun 21, 2022Updated 3 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Researchβ53Mar 16, 2018Updated 8 years ago
- β15May 27, 2019Updated 6 years ago
- Build sneaky & malicious LNK files.β161Jul 16, 2025Updated 8 months ago
- A Python3 CLI application that allows to upload articles written in Markdown to draft blog posts in Ghostβ11Apr 5, 2019Updated 6 years ago
- Cross Compatible Command and Controlβ47Dec 18, 2025Updated 3 months ago