misterch0c / cve-searchLinks
cve-search - a tool to perform local searches for known vulnerabilities
☆8Updated 8 years ago
Alternatives and similar repositories for cve-search
Users that are interested in cve-search are comparing it to the libraries listed below
Sorting:
- A curated list of awesome Security Hardening techniques for Windows.☆19Updated 8 years ago
- zeus-style banking trojan☆14Updated 8 years ago
- Fish shell plugin to extract (almost) any kind of archives☆11Updated 9 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23Updated 3 years ago
- Collection of cracked malware☆14Updated 6 years ago
- Man-in-the-middle against Tor bridges☆26Updated 5 years ago
- Checklists☆17Updated 8 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 5 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆11Updated 8 years ago
- A copy of articles published at Peerlyst☆40Updated 8 years ago
- Find all hostnames related to a given domain. Helpful during VA/PT work.☆15Updated 3 years ago
- The Shodan developer documentation covering the various APIs for Shodan, Exploits, Scanhub and anything else that's offered by Shodan.☆19Updated 11 years ago
- Created by Denis Podgurskiy via the GitHub Connector☆12Updated 4 years ago
- Network white noise collector☆19Updated 9 years ago
- Open Standard Vulnerability & Compliance Scanner☆44Updated 9 years ago
- The Dictionary service provides access to the data dictionary and edge dictionary. These services provide metadata about fields that are …☆21Updated 4 months ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- It is a script written in Python that performs brute force on workers' payroll files through the use of their DNI (National Identity Docu…☆12Updated 4 years ago
- Hacking environment installation scripts for OS X☆27Updated 3 years ago
- BDsploit (Big Data Exploitation and Post-exploitation Toolkit)☆5Updated last year
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 3 years ago
- Cryptocurrencies related Security resources☆14Updated 2 years ago
- Collections of way to evade normal detection events.☆25Updated 4 years ago
- Google dorks generator to find open shells (on government sites)☆30Updated 11 years ago
- Identify connection of sessions for social engineering attacks.☆57Updated 8 years ago
- My various configuration files for zsh, vim, tmux, etc.☆24Updated 3 years ago
- Pentest ToolKit☆28Updated 5 years ago
- Build tools to generate vagrant images used by metasploit-framework CI☆13Updated 5 months ago
- Automated encryption utilities and installation☆12Updated 4 years ago