👀CVE Simple List
☆74May 2, 2026Updated last week
Alternatives and similar repositories for CVE-Easy-List
Users that are interested in CVE-Easy-List are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 🔍NVD exploit & JVN(Japan Vulnerability Notes) easy description☆91May 2, 2026Updated last week
- Trends Website (URL) from Twitter hackers.☆116Updated this week
- An exploit for CVE-2018-5955 GitStack 2.3.10 Unauthenticated RCE☆10Nov 15, 2024Updated last year
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆7,697Updated this week
- My brain in Obsidian☆10Oct 6, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Android pin cracker☆14Mar 25, 2022Updated 4 years ago
- Repository of CVE found by OCD people☆85Jun 19, 2025Updated 10 months ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Free, open-source crypto trading bot, automated bitcoin / cryptocurrency trading software, algorithmic trading bots. Visually design your…☆12Mar 31, 2022Updated 4 years ago
- Transfer file over Dns☆10Nov 26, 2024Updated last year
- Scripts to automatically create VM images☆15Apr 12, 2026Updated 3 weeks ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Jul 2, 2021Updated 4 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Apache Shiro CVE-2022-32532☆13Jun 28, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Face Swapping using Mediapipe and OpenCV☆15Dec 5, 2023Updated 2 years ago
- ☆17Feb 4, 2020Updated 6 years ago
- black Ip lists, dorks-collection☆17May 1, 2026Updated last week
- This script helps to identify CVE-2021-26855 ssrf Poc☆22Mar 10, 2021Updated 5 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- Linux Transparent Proxy (Similar to Proxifiter)☆33Nov 27, 2024Updated last year
- Get tweets and save file in JSON format without Twitter API☆11Jan 1, 2019Updated 7 years ago
- gozero: the wannabe zero dependency runtime for Go developers (experimental)☆25Apr 21, 2026Updated 2 weeks ago
- This is collection of latest CVE POCs.☆30Mar 1, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Send emails using Gmail and Generate OAUTH2 Tokens in Python☆10Feb 6, 2022Updated 4 years ago
- ☆12May 27, 2021Updated 4 years ago
- FutureTrust analyzes electronic identification (eID) services in Europe and beyond. It is funded within the EU Framework Programme for Re…☆12Nov 16, 2022Updated 3 years ago
- ☆12May 28, 2021Updated 4 years ago
- Eclipse plugin suite providing integration with security testing tools.☆11Apr 23, 2016Updated 10 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Dec 2, 2025Updated 5 months ago
- Add tracking hidden image to Word documents☆16Aug 30, 2017Updated 8 years ago
- Discord Webhook Cannon is a C# multithreaded, open-source Discord Webhook flooder. It can be used to flood webhooks which are used in mal…☆10Mar 14, 2021Updated 5 years ago
- Scripts to clone CA certificates for use in HTTPS client attacks.☆36Mar 26, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- CodeX Tool is to Convert Phishing URL to qr code !☆16Feb 16, 2021Updated 5 years ago
- common methods that used by my burp extension projects☆52Apr 12, 2024Updated 2 years ago
- Chat GPT Things by Taylor Newsome☆12Mar 19, 2024Updated 2 years ago
- Remove Offensive and Profane Words from Wordlists☆16Jul 27, 2023Updated 2 years ago
- JndiBypass漏洞利用,可动态生成类,防止类注入冲突☆28Aug 16, 2023Updated 2 years ago
- Docker container with Apache 2 / CGI shellshock vulnerable.☆12Dec 18, 2017Updated 8 years ago
- Horizontal Domain Discovery☆76May 22, 2023Updated 2 years ago