Tool to find CVEs and Exploits.
☆489Feb 28, 2024Updated 2 years ago
Alternatives and similar repositories for cve-maker
Users that are interested in cve-maker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,327Updated this week
- The useful exploit finder☆826Jan 19, 2026Updated 3 months ago
- Docker Remote API Scanner and Exploit☆180Nov 13, 2023Updated 2 years ago
- PacketSpy☆157May 31, 2024Updated last year
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,278Jul 18, 2024Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Simplify your life with leak detection in JavaScript. NipeJS streamlines the use of regex, making it effortless to uncover potential leak…☆95Aug 9, 2024Updated last year
- An aggressor script that can help automate payload building in Cobalt Strike☆118Jan 22, 2024Updated 2 years ago
- ☆124Aug 24, 2025Updated 7 months ago
- ☆569Mar 28, 2024Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- Demonized Shell is an Advanced Tool for persistence in linux.☆445Jan 5, 2025Updated last year
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆515Aug 7, 2024Updated last year
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,166Mar 8, 2026Updated last month
- CVE-2024-21893: SSRF Vulnerability in Ivanti Connect Secure☆95Feb 2, 2024Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A Slack bot phishing framework for Red Teaming exercises☆166Apr 27, 2024Updated last year
- ☆542Jun 26, 2024Updated last year
- Reverse shell that can bypass windows defender detection☆173Mar 31, 2026Updated 2 weeks ago
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆791Jan 9, 2025Updated last year
- ☆35Dec 6, 2023Updated 2 years ago
- My Private Bug Hunting Methodology☆317Nov 27, 2024Updated last year
- 针对多个框架的高度自定义的内存马一键打入工具 | A highly customized memory shell one-click injection tool for multiple frameworks☆49Feb 6, 2024Updated 2 years ago
- hauditor is a tool designed to analyze the security headers returned by a web page.☆178Jul 6, 2024Updated last year
- APKHunt is a comprehensive static code analysis tool for Android apps that is based on the OWASP MASVS framework. Although APKHunt is int…☆959Jan 17, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- i will upload more templates here to share with the comunity.☆569Apr 17, 2024Updated 2 years ago
- Web Security Scanner☆382Nov 13, 2025Updated 5 months ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆748Jan 25, 2026Updated 2 months ago
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆442May 29, 2024Updated last year
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆1,027Updated this week
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆43Jun 15, 2025Updated 10 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,186Mar 28, 2025Updated last year
- All in 1 phishing framework☆36Aug 20, 2022Updated 3 years ago
- HTTP 403 bypass tool☆616Mar 16, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆444Oct 1, 2025Updated 6 months ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Jul 22, 2024Updated last year
- Windows Local Privilege Escalation Cookbook☆1,300Feb 5, 2026Updated 2 months ago
- CVE-2023-22527 - RCE (Remote Code Execution) Vulnerability In Confluence Data Center and Confluence Server PoC☆26Jan 23, 2024Updated 2 years ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆146May 17, 2024Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆167Oct 28, 2025Updated 5 months ago