mr-kasim-mehar / CveSpiderView external linksLinks
A Python tool to resolve domains to IPs, fetch related CVEs, and display open ports
☆15Nov 21, 2025Updated 2 months ago
Alternatives and similar repositories for CveSpider
Users that are interested in CveSpider are comparing it to the libraries listed below
Sorting:
- Exploit for CyberPanel Pre-Auth RCE via Command Injection☆22Nov 1, 2024Updated last year
- CorsOne - CORS Misconfiguration Discovery Tool☆25Jan 27, 2026Updated 3 weeks ago
- A network logging tool that logs per process activities☆32Jun 13, 2023Updated 2 years ago
- ☆38Feb 9, 2025Updated last year
- Fofa数据抓取工具-UI版☆13Mar 24, 2024Updated last year
- ☆10Sep 24, 2021Updated 4 years ago
- ☆14Feb 19, 2023Updated 2 years ago
- ☆10Mar 11, 2024Updated last year
- This Script contains tools like assetfinder, amass, httprobe, subjack, nmap, waybackurls and gowitness☆13Mar 31, 2022Updated 3 years ago
- ☆10Mar 6, 2023Updated 2 years ago
- ☆13Jun 27, 2022Updated 3 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- cve-2025-24813验证脚本☆11Mar 14, 2025Updated 11 months ago
- This repository is related to specialized books published by the THB team.☆20Aug 13, 2025Updated 6 months ago
- SSE to Stdio MCP Proxy Server☆17Jun 9, 2025Updated 8 months ago
- OpenSSH Vulnerabilities Scanner: Bulk Scanning Tool for 21 different OpenSSH CVEs.☆10Apr 29, 2025Updated 9 months ago
- 德州扑克,基于Cocos Creator 3.6☆11Apr 10, 2024Updated last year
- ☆15Apr 20, 2020Updated 5 years ago
- A tool to locate people using social engineering.☆11Mar 13, 2022Updated 3 years ago
- Fixes known BinaryFormatter deserialization vulnerabilities☆12Dec 16, 2019Updated 6 years ago
- gRPC / gRPC-Web Pentest Practicing Lab☆10Aug 29, 2023Updated 2 years ago
- A demonstration of OWASP 2017 Top 10 and .NET Core☆11Mar 17, 2023Updated 2 years ago
- Dependency vulnerability auditor for PHP☆14Jun 5, 2023Updated 2 years ago
- A simplex kernel-based keylogger written for fun, not evil.☆16Apr 3, 2018Updated 7 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- MAZAPA Writeups - RedTeam Based Peetrochemical Network for Attack☆12Apr 8, 2024Updated last year
- Emulate the handshake packets of an RDP server with python☆15Jun 26, 2018Updated 7 years ago
- A tool to embed files into images☆14Feb 10, 2021Updated 5 years ago
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- ☆19Jan 13, 2025Updated last year
- MAC Address brute forcing tool, used to bypass MAC based filtering☆16Feb 26, 2022Updated 3 years ago
- Docker container with Apache 2 / CGI shellshock vulnerable.☆12Dec 18, 2017Updated 8 years ago
- Jupyter Kernel for CodeQL☆15Feb 26, 2025Updated 11 months ago
- implement a paper in Matlab: Detection of Cyber-attacks to indoor real time localization systems for autonomous robots☆13Dec 21, 2019Updated 6 years ago
- PoC of the Hundred Finance March 2022 exploit☆10Nov 10, 2022Updated 3 years ago
- DroidSniper - Misconfigured Android Debug Bridge Scanner☆13Mar 26, 2024Updated last year
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- Provides a consistent API around some existing scanning tools to integrate them with the rest of the tool kit☆17Feb 3, 2026Updated 2 weeks ago
- ☆12Nov 1, 2022Updated 3 years ago