Find CVEs associated to Linux and public exploits on github
☆119Apr 10, 2025Updated 10 months ago
Alternatives and similar repositories for github_cves_search
Users that are interested in github_cves_search are comparing it to the libraries listed below
Sorting:
- Windows priviledge escalation script☆13Feb 1, 2025Updated last year
- WebSocket Penetration Testing Toolkit for Burp Suite☆27Feb 12, 2026Updated 2 weeks ago
- A simple bug bounty utility tool to remove uninteresting entries from a list of URLs.☆14Jul 22, 2024Updated last year
- Automatic Bug finder with buprsuite☆166Mar 6, 2023Updated 2 years ago
- ☆11Sep 15, 2024Updated last year
- Modules for my C2 course students to use for their own projects.☆73Jun 13, 2023Updated 2 years ago
- ☆41Sep 9, 2023Updated 2 years ago
- Apple BLE proximity pairing message spoofing☆19Aug 29, 2023Updated 2 years ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- PoC Script for CVE-2023-4596, unauthenticated Remote Command Execution through arbitrary file uploads.☆24Aug 28, 2025Updated 6 months ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,302Updated this week
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated last year
- Avocado is a powerful C2 framework written in Python with stageless implants in Rust. Avocado's implant runs seamlessly on both Linux and…☆27Feb 15, 2026Updated 2 weeks ago
- This is my starred repositories including the description for each tool. Makes search/filter over them easier.☆61Feb 26, 2025Updated last year
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆12Feb 26, 2024Updated 2 years ago
- Unveiling Cyber Threats: From assets to Vulnerability Insights☆17Oct 22, 2024Updated last year
- ☆29May 16, 2023Updated 2 years ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30May 7, 2024Updated last year
- ☆54Jan 21, 2025Updated last year
- A RedTeam Toolkit☆407Aug 14, 2025Updated 6 months ago
- Speed up your pentest enumeration☆82Oct 5, 2025Updated 4 months ago
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆15Oct 16, 2024Updated last year
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- Collection of various WINAPI tricks / features used or abused by Malware☆13Mar 28, 2022Updated 3 years ago
- Hello Hackers ! , Shigaraki tool is all in one for finding specially admin panels , login panels from all subdomains .☆15Jul 1, 2025Updated 8 months ago
- ☆18Nov 2, 2024Updated last year
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- Automatic Tools For Metabase Exploit Known As CVE-2023-38646☆27Aug 11, 2023Updated 2 years ago
- OSIF gathers sensitive Facebook account information even with full privacy.☆10Nov 26, 2022Updated 3 years ago
- ☆12Feb 19, 2025Updated last year
- Simple Shellcode Runner in Rust Language☆18Dec 8, 2023Updated 2 years ago
- ☆41Aug 8, 2023Updated 2 years ago
- ☆21Nov 19, 2025Updated 3 months ago
- ☆19Jan 14, 2026Updated last month
- ☆15Apr 5, 2023Updated 2 years ago
- ☆35Dec 6, 2023Updated 2 years ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆1,253Jul 22, 2025Updated 7 months ago
- A BloodHound collector for Microsoft Configuration Manager☆391Jul 7, 2025Updated 7 months ago
- Dominate Active Directory with PowerShell.☆1,164Nov 28, 2025Updated 3 months ago