Tool to find CVEs and Exploits.
☆486Feb 28, 2024Updated 2 years ago
Alternatives and similar repositories for cve-maker
Users that are interested in cve-maker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,351Updated this week
- The useful exploit finder☆824Jan 19, 2026Updated 3 months ago
- Docker Remote API Scanner and Exploit☆180Nov 13, 2023Updated 2 years ago
- PacketSpy☆159May 31, 2024Updated last year
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,279Jul 18, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Simplify your life with leak detection in JavaScript. NipeJS streamlines the use of regex, making it effortless to uncover potential leak…☆95Aug 9, 2024Updated last year
- An aggressor script that can help automate payload building in Cobalt Strike☆118Jan 22, 2024Updated 2 years ago
- ☆125Aug 24, 2025Updated 8 months ago
- ☆571Mar 28, 2024Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- Demonized Shell is an Advanced Tool for persistence in linux.☆450Jan 5, 2025Updated last year
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆517Aug 7, 2024Updated last year
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,175Apr 30, 2026Updated 2 weeks ago
- CVE-2024-21893: SSRF Vulnerability in Ivanti Connect Secure☆95Feb 2, 2024Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A Slack bot phishing framework for Red Teaming exercises☆165Apr 27, 2024Updated 2 years ago
- ☆544Jun 26, 2024Updated last year
- Reverse shell that can bypass windows defender detection☆174Mar 31, 2026Updated last month
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆793Jan 9, 2025Updated last year
- ☆35Dec 6, 2023Updated 2 years ago
- My Private Bug Hunting Methodology☆322Nov 27, 2024Updated last year
- hauditor is a tool designed to analyze the security headers returned by a web page.☆178Jul 6, 2024Updated last year
- 针对多个框架的高度自定义的内存马一键打入工具 | A highly customized memory shell one-click injection tool for multiple frameworks☆49Feb 6, 2024Updated 2 years ago
- APKHunt is a comprehensive static code analysis tool for Android apps that is based on the OWASP MASVS framework. Although APKHunt is int…☆964Jan 17, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Web Security Scanner☆383Nov 13, 2025Updated 6 months ago
- i will upload more templates here to share with the comunity.☆571Apr 17, 2024Updated 2 years ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆756Jan 25, 2026Updated 3 months ago
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆444May 29, 2024Updated last year
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆1,032Apr 17, 2026Updated 3 weeks ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆44Jun 15, 2025Updated 11 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,255Mar 28, 2025Updated last year
- All in 1 phishing framework☆36Aug 20, 2022Updated 3 years ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆443Oct 1, 2025Updated 7 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- HTTP 403 bypass tool☆625Mar 16, 2024Updated 2 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Jul 22, 2024Updated last year
- CVE-2023-22527 - RCE (Remote Code Execution) Vulnerability In Confluence Data Center and Confluence Server PoC☆26Jan 23, 2024Updated 2 years ago
- Windows Local Privilege Escalation Cookbook☆1,318Feb 5, 2026Updated 3 months ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆146May 17, 2024Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆167Oct 28, 2025Updated 6 months ago