☆52Dec 7, 2025Updated 4 months ago
Alternatives and similar repositories for CVE-nu11secur1ty
Users that are interested in CVE-nu11secur1ty are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Oct 24, 2024Updated last year
- Automated Recon Tool Installer☆16Jun 29, 2022Updated 3 years ago
- CVE-2022-24112:Apache APISIX apisix/batch-requests RCE☆44Feb 22, 2022Updated 4 years ago
- all manner of wordlists☆24Jan 19, 2022Updated 4 years ago
- Private vulnerability testing suite☆13Mar 30, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- CVE-2023-52251 There is a Remote Code Execution vulnerability provectus/kafka-ui.☆21Jan 23, 2024Updated 2 years ago
- This repository contains random Nuclei templates I've created. Most of them based on recent security issues and exploits.☆18May 21, 2024Updated last year
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- ☆10Feb 22, 2023Updated 3 years ago
- CVE-2023-21742 Poc☆14Apr 7, 2023Updated 3 years ago
- ☆11Updated this week
- This repo offers comprehensive information, necessary tools, and instructional videos for beginners in Android penetration testing, provi…☆23Jun 12, 2023Updated 2 years ago
- ☆11Jun 19, 2024Updated last year
- IDOR bypass fuzz 权限绕过burp 插件 fuzz (shiro 等)☆27Sep 1, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Local File Inclusion (LFI) in FHEM 6.0 allows an attacker to include a file, it can lead to sensitive information disclosure.☆12Jan 20, 2021Updated 5 years ago
- The purpose of this repo is to share my research☆14Apr 7, 2025Updated last year
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆34Aug 28, 2023Updated 2 years ago
- Exploit for CVE-2023-3460. Unauthorized admin access for Ultimate Member plugin < v2.6.7☆35Jul 5, 2023Updated 2 years ago
- w1f1t3kAl1☆46Feb 16, 2024Updated 2 years ago
- ALL IN ONE Hacking Tool For Hackers☆25Feb 8, 2021Updated 5 years ago
- ☆11Feb 6, 2023Updated 3 years ago
- A Python-based automation tool for interacting with the Burp Suite API to run scans and retrieve vulnerability data programmatically.☆10Oct 3, 2022Updated 3 years ago
- Exploits for different vulnerabilities☆12Nov 29, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- go调用最大cpu内核数实现批量ip列表tcp端口快速扫描☆15Mar 20, 2020Updated 6 years ago
- 🗂 Knowledge Base on the Security of Chromium Extensions (https://extensions.neplox.security)☆21Jan 24, 2025Updated last year
- 永恒之恶龙-Log4j漏洞安全自查工具☆40Jan 18, 2022Updated 4 years ago
- All in one subdomain Enumeration tool☆21Jan 1, 2023Updated 3 years ago
- ☆62May 30, 2023Updated 2 years ago
- This script reads a text file containing domains, fetches the subdomains from crt.sh☆11May 31, 2023Updated 2 years ago
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 7 years ago
- CVE-2023-22621: SSTI to RCE by Exploiting Email Templates affecting Strapi Versions <=4.5.5☆24Apr 25, 2023Updated 2 years ago
- script python to check url list via cookies and Authorization☆19Feb 28, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Some contributions in the nuclei-templates repository☆62Jun 18, 2022Updated 3 years ago
- ☆12Dec 15, 2021Updated 4 years ago
- Debpic lets you easily build Debian packages in an isolated Docker environment.☆11Apr 7, 2026Updated last week
- Shared wordlists used for common subdomains , directory bruteforcing etc.☆10May 26, 2025Updated 10 months ago
- A program for collecting subdomains of a list of given second-level domains (SLD)☆15Feb 10, 2026Updated 2 months ago
- Techniques / Tips and tricks for finding sensitive data exposures in Github for Penetration Testers / Bug Bounty Hunters☆17Aug 1, 2020Updated 5 years ago
- Apache Struts2 S2-062远程代码执行漏洞(CVE-2021-31805) | 反弹Shell☆11Apr 18, 2022Updated 4 years ago