Tool to find CVEs and Exploits.
☆489Feb 28, 2024Updated 2 years ago
Alternatives and similar repositories for cve-maker
Users that are interested in cve-maker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,315Mar 19, 2026Updated last week
- The useful exploit finder☆827Jan 19, 2026Updated 2 months ago
- Docker Remote API Scanner and Exploit☆179Nov 13, 2023Updated 2 years ago
- PacketSpy☆157May 31, 2024Updated last year
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,276Jul 18, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Simplify your life with leak detection in JavaScript. NipeJS streamlines the use of regex, making it effortless to uncover potential leak…☆95Aug 9, 2024Updated last year
- An aggressor script that can help automate payload building in Cobalt Strike☆118Jan 22, 2024Updated 2 years ago
- ☆124Aug 24, 2025Updated 7 months ago
- ☆569Mar 28, 2024Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- Demonized Shell is an Advanced Tool for persistence in linux.☆443Jan 5, 2025Updated last year
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆516Aug 7, 2024Updated last year
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,157Mar 8, 2026Updated 2 weeks ago
- CVE-2024-21893: SSRF Vulnerability in Ivanti Connect Secure☆95Feb 2, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A Slack bot phishing framework for Red Teaming exercises☆166Apr 27, 2024Updated last year
- ☆544Jun 26, 2024Updated last year
- Reverse shell that can bypass windows defender detection☆171Feb 3, 2024Updated 2 years ago
- ☆35Dec 6, 2023Updated 2 years ago
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆789Jan 9, 2025Updated last year
- My Private Bug Hunting Methodology☆316Nov 27, 2024Updated last year
- 针对多个框架的高度自定义的内存马一键打入工具 | A highly customized memory shell one-click injection tool for multiple frameworks☆49Feb 6, 2024Updated 2 years ago
- hauditor is a tool designed to analyze the security headers returned by a web page.☆177Jul 6, 2024Updated last year
- APKHunt is a comprehensive static code analysis tool for Android apps that is based on the OWASP MASVS framework. Although APKHunt is int…☆959Jan 17, 2025Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- i will upload more templates here to share with the comunity.☆569Apr 17, 2024Updated last year
- Web Security Scanner☆383Nov 13, 2025Updated 4 months ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆740Jan 25, 2026Updated 2 months ago
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆1,024Feb 1, 2026Updated last month
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆441May 29, 2024Updated last year
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆43Jun 15, 2025Updated 9 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,173Mar 28, 2025Updated 11 months ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆443Oct 1, 2025Updated 5 months ago
- All in 1 phishing framework☆36Aug 20, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Jul 22, 2024Updated last year
- HTTP 403 bypass tool☆615Mar 16, 2024Updated 2 years ago
- Windows Local Privilege Escalation Cookbook☆1,287Feb 5, 2026Updated last month
- CVE-2023-22527 - RCE (Remote Code Execution) Vulnerability In Confluence Data Center and Confluence Server PoC☆25Jan 23, 2024Updated 2 years ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆145May 17, 2024Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆166Oct 28, 2025Updated 4 months ago