msd0pe-1 / cve-maker
Tool to find CVEs and Exploits.
☆464Updated 11 months ago
Alternatives and similar repositories for cve-maker:
Users that are interested in cve-maker are comparing it to the libraries listed below
- Pentesting automation platform that combines hacking tools to complete assessments☆445Updated 2 weeks ago
- Redeye is a tool intended to help you manage your data during a pentest operation☆464Updated 5 months ago
- A RedTeam Toolkit☆391Updated 3 months ago
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆557Updated 2 months ago
- Script for generating revshells☆460Updated 4 months ago
- Red Team Attack Lab for TTP testing & research☆562Updated last year
- Demonized Shell is an Advanced Tool for persistence in linux.☆311Updated 3 weeks ago
- ☆216Updated 7 months ago
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,059Updated 6 months ago
- Dome - Subdomain Enumeration Tool. Fast and reliable python script that makes active and/or passive scan to obtain subdomains and search …☆524Updated 11 months ago
- Collection of PoC and offensive techniques used by the BlackArrow Red Team☆1,099Updated 6 months ago
- ☆519Updated 7 months ago
- Divide full port scan results and use it for targeted Nmap runs☆315Updated 6 months ago
- ↕️🤫 Stealth redirector for your red team operation security☆650Updated 5 months ago
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆507Updated 3 weeks ago
- A simple tool for bypassing file upload restrictions.☆811Updated 6 months ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆604Updated 7 months ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆651Updated 8 months ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆345Updated last year
- Catspin rotates the IP address of HTTP requests making IP based blocks or slowdown measures ineffective. It is based on AWS API Gateway a…☆258Updated 10 months ago
- Pentest Report Generator☆391Updated this week
- A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomain…☆842Updated last year
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆429Updated last year
- Nuclei templates for honeypots detection.☆196Updated last year
- ☆514Updated last year
- Pentester's Promiscuous Notebook☆477Updated 3 weeks ago
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆330Updated last year
- OSINT Template Engine☆532Updated last year
- evilginx3 + gophish☆1,708Updated 7 months ago
- PowerShell Ransomware Simulator with C2 Server☆476Updated last year