msd0pe-1 / cve-makerLinks
Tool to find CVEs and Exploits.
☆479Updated last year
Alternatives and similar repositories for cve-maker
Users that are interested in cve-maker are comparing it to the libraries listed below
Sorting:
- Pentesting automation platform that combines hacking tools to complete assessments☆470Updated last week
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆619Updated 8 months ago
- Redeye is a tool intended to help you manage your data during a pentest operation☆467Updated 10 months ago
- Script for generating revshells☆473Updated 10 months ago
- Sticky notes for pentesting, bug bounty, CTF.☆705Updated 2 months ago
- Dome - Subdomain Enumeration Tool. Fast and reliable python script that makes active and/or passive scan to obtain subdomains and search …☆536Updated last year
- OSINT Template Engine☆547Updated last year
- ☆235Updated last year
- ☆429Updated 10 months ago
- A RedTeam Toolkit☆402Updated 3 months ago
- Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together.☆565Updated 3 weeks ago
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆529Updated last year
- PeTeReport is an open-source application vulnerability reporting tool.☆509Updated last year
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆155Updated this week
- A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highli…☆399Updated 5 months ago
- Pentester's Promiscuous Notebook☆498Updated last month
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆350Updated last year
- HTTP 403 bypass tool☆521Updated last year
- A simple tool for bypassing file upload restrictions.☆870Updated 11 months ago
- Red Team Attack Lab for TTP testing & research☆576Updated 2 years ago
- Divide full port scan results and use it for targeted Nmap runs☆324Updated last year
- Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force m…☆394Updated 3 years ago
- Catspin rotates the IP address of HTTP requests making IP based blocks or slowdown measures ineffective. It is based on AWS API Gateway a…☆264Updated last year
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆450Updated last year
- TerminatorZ is a highly sophisticated and efficient web security tool that scans for top potential vulnerabilities with known CVEs in you…☆280Updated 10 months ago
- Nmap script that scans for probable vulnerabilities based on services discovered in open ports.☆205Updated 4 months ago
- A SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them bi…☆453Updated 4 months ago
- ICMP Reverse Shell written in Python 3 and with Scapy (backdoor/rev shell)☆350Updated 10 months ago
- Hourly updated database of exploit and exploitation reports☆256Updated 5 months ago
- Pentest Report Generator☆412Updated last month