misterch0c / cve-search
cve-search - a tool to perform local searches for known vulnerabilities
☆8Updated 8 years ago
Alternatives and similar repositories for cve-search:
Users that are interested in cve-search are comparing it to the libraries listed below
- A curated list of awesome Security Hardening techniques for Windows.☆19Updated 7 years ago
- zeus-style banking trojan☆14Updated 7 years ago
- Collection of cracked malware☆14Updated 6 years ago
- Honeypot for router backdoor (TCP 32764)☆17Updated 10 years ago
- Automated Google dorking with custom search engines☆26Updated 4 years ago
- Dependencies for Veil 3☆18Updated 7 years ago
- A web app scanner☆26Updated 11 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆11Updated 7 years ago
- DPE - Default Password Enumeration☆33Updated 11 years ago
- Cryptocurrencies related Security resources☆14Updated last year
- Exploitation Tool For Windows Using Batch and Powershell☆21Updated last month
- ☆17Updated 11 months ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 8 years ago
- Security Advisories and Researches☆16Updated 10 years ago
- XMLRPC server for password cracking☆33Updated 10 years ago
- Test Android Application.☆19Updated 9 years ago
- Test Suite for John the Ripper☆24Updated 3 years ago
- The Shodan developer documentation covering the various APIs for Shodan, Exploits, Scanhub and anything else that's offered by Shodan.☆18Updated 11 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- Reverse/ Bind Shell Generator for cross platform systems☆19Updated 6 years ago
- Pentest ToolKit☆27Updated 4 years ago
- Various exploits☆10Updated 7 years ago
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- A copy of articles published at Peerlyst☆38Updated 8 years ago
- A botnet (C&C) framework that create in bash and using crontab for periodic execute☆11Updated 7 years ago
- Ease-of-use extension for Web Application penetration testing☆18Updated 7 years ago
- BDsploit (Big Data Exploitation and Post-exploitation Toolkit)☆5Updated last year
- Passive Spider uses search engines to find interesting information about a target domain.☆17Updated 11 years ago
- SWF Vulnerability & Information Scanner☆19Updated 6 years ago
- ☆13Updated 2 years ago