Vulnerability Knowledge Base comparison tool
☆13Feb 9, 2022Updated 4 years ago
Alternatives and similar repositories for vulnkbdiff
Users that are interested in vulnkbdiff are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- This tool is designed for those situations during a pentest where you have upload access to a webserver that’s running PHP. Upload this …☆23Aug 6, 2024Updated last year
- An Advanced PHP Cryptography Framework☆16Feb 12, 2024Updated 2 years ago
- Post-Auth RCE & Persistence on UOKOO Security Cameras☆13Nov 17, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.☆15Apr 13, 2023Updated 2 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Mar 10, 2026Updated 2 weeks ago
- Simple RAT in C#☆27Apr 11, 2020Updated 5 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- Human Oriented SHell☆28Updated this week
- Unicode encoding attacks with machine learning☆98Nov 25, 2021Updated 4 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Jun 30, 2020Updated 5 years ago
- Automated Script For Hacking Into CAN Bus - Car Hacking☆141Sep 10, 2021Updated 4 years ago
- 🔥 Pentest Cheat Sheet☆36Aug 10, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆17Jan 2, 2020Updated 6 years ago
- wp-file-manager 6.7 (Aug 2020) Wordpress Plugin 0day - Remote Code Execution☆75Oct 9, 2020Updated 5 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- Docker image for hacking☆21Feb 10, 2025Updated last year
- WRecon is an open source no intussive web scanner. It is designed to discover all URL in a website recursively, without using bruteforce …☆19Oct 23, 2020Updated 5 years ago
- ☆25Aug 19, 2024Updated last year
- This project will provide DevOps automation in the form of snippets, sample apps, and plugins in support of integrating with IBM Applicat…☆12Sep 17, 2025Updated 6 months ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- A twitter streaming, website-scraping, websocket-transporting news delivery webapp written in Go☆10Jul 17, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- 🐊 A small Password Attack☆15Apr 1, 2024Updated last year
- exploit CVE-2019-7609(kibana RCE) on right way by python2 scripts☆17Oct 23, 2019Updated 6 years ago
- CybOX Tools and Scripts☆44Nov 25, 2013Updated 12 years ago
- Web Recon & Exploitation Tool.☆55Mar 8, 2020Updated 6 years ago
- Custom security distro for remote penetration testing☆56Mar 26, 2021Updated 5 years ago
- Libreoffice extension to convert image to editable document☆18Dec 11, 2016Updated 9 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Oct 9, 2020Updated 5 years ago
- Analyze a real-time IPv4 packet stream and export metrics about the data flows☆14Jan 29, 2020Updated 6 years ago
- PEDA - Python Exploit Development Assistance for GDB☆23Aug 6, 2025Updated 7 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Wi-Fi Exploit Tool☆50May 23, 2020Updated 5 years ago
- Ashok is a Osint Reconnaissance Tool , a.k.a swiss knife for Reconnaissance , A tool for every beginner/pentester in their penetration t…☆26May 8, 2020Updated 5 years ago
- This is an amazing tool using which you can download all tools for termux.☆39Sep 12, 2022Updated 3 years ago
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from them☆19Updated this week
- IOCTL-Flooder is a verbose tool designed to help with Windows driver fuzzing by brute forcing IOCTLs on loaded drivers. GetLastError is u…☆11Aug 21, 2018Updated 7 years ago
- Just Mod Version of lokiboard with remote reporting via Gmail☆47Jun 12, 2020Updated 5 years ago
- wifi attacks suite☆59Sep 24, 2020Updated 5 years ago