Tool to find CVEs and Exploits.
☆489Feb 28, 2024Updated 2 years ago
Alternatives and similar repositories for cve-maker
Users that are interested in cve-maker are comparing it to the libraries listed below
Sorting:
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,302Feb 25, 2026Updated last week
- The useful exploit finder☆826Jan 19, 2026Updated last month
- Docker Remote API Scanner and Exploit☆180Nov 13, 2023Updated 2 years ago
- PacketSpy☆157May 31, 2024Updated last year
- ☆544Jun 26, 2024Updated last year
- A Slack bot phishing framework for Red Teaming exercises☆166Apr 27, 2024Updated last year
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,156Updated this week
- ☆568Mar 28, 2024Updated last year
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆442Oct 1, 2025Updated 5 months ago
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,267Jul 18, 2024Updated last year
- 针对多个框架的高度自定义的内存马一键打入工具 | A highly customized memory shell one-click injection tool for multiple frameworks☆49Feb 6, 2024Updated 2 years ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆144May 17, 2024Updated last year
- Windows Local Privilege Escalation Cookbook☆1,281Feb 5, 2026Updated last month
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆514Aug 7, 2024Updated last year
- ☆124Aug 24, 2025Updated 6 months ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Jul 22, 2024Updated last year
- Simplify your life with leak detection in JavaScript. NipeJS streamlines the use of regex, making it effortless to uncover potential leak…☆96Aug 9, 2024Updated last year
- i will upload more templates here to share with the comunity.☆567Apr 17, 2024Updated last year
- hauditor is a tool designed to analyze the security headers returned by a web page.☆176Jul 6, 2024Updated last year
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆787Jan 9, 2025Updated last year
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆441May 29, 2024Updated last year
- An aggressor script that can help automate payload building in Cobalt Strike☆118Jan 22, 2024Updated 2 years ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆43Jan 30, 2024Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆3,161Mar 28, 2025Updated 11 months ago
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆1,019Feb 1, 2026Updated last month
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆207Jan 12, 2025Updated last year
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆723Updated this week
- My Private Bug Hunting Methodology☆316Nov 27, 2024Updated last year
- Reverse shell that can bypass windows defender detection☆170Feb 3, 2024Updated 2 years ago
- ☆35Dec 6, 2023Updated 2 years ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆729Jan 25, 2026Updated last month
- Demonized Shell is an Advanced Tool for persistence in linux.☆441Jan 5, 2025Updated last year
- APKHunt is a comprehensive static code analysis tool for Android apps that is based on the OWASP MASVS framework. Although APKHunt is int…☆954Jan 17, 2025Updated last year
- All in 1 phishing framework☆36Aug 20, 2022Updated 3 years ago
- HTTP 403 bypass tool☆612Mar 16, 2024Updated last year
- Azure DevOps Services Attack Toolkit☆313Mar 15, 2025Updated 11 months ago
- reverse shell using curl☆478Apr 20, 2024Updated last year
- A cheat sheet that contains advanced queries for SQL Injection of all types.☆3,149May 13, 2023Updated 2 years ago