phx / cvescanLinks
Easily scan for CVEs using nmap.
☆15Updated 3 years ago
Alternatives and similar repositories for cvescan
Users that are interested in cvescan are comparing it to the libraries listed below
Sorting:
- Malware written in bash to serve as an initial dropper script that will provide a strong foothold on the target device via reverse shells…☆20Updated 2 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆26Updated 7 years ago
- Papers, presentations and documents from the team at Hacker House.☆52Updated 6 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆18Updated 5 years ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆176Updated 8 months ago
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆30Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- The best exploitation tool for SSL VPN 0day vulnerabilities.☆81Updated 4 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- Simple & Customizable DNS Data Exfiltrator☆113Updated 2 years ago
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- Pivot your way deeper into computer networks with SSH compromised machines.☆64Updated 3 years ago
- Ethical hacking, CTF, tools & etc☆22Updated 4 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago
- privilege escalation by piggy-backing user sudo requests☆16Updated 2 years ago
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆21Updated 6 years ago
- A python approach to interacting with web shells.☆30Updated 4 years ago
- Free Advance encryptor for Anon Cloud☆16Updated 2 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆18Updated 4 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆25Updated 3 years ago
- Automate All Pivoting System Enumeration with this Bash Script☆13Updated 3 years ago
- Repository and archive for Killing The Bear Gitbook☆84Updated 2 years ago
- Multiplatform Telegram Bot in pure PowerShell☆55Updated 3 years ago
- NoSQL Injection Tool to bypass login forms & extract usernames/passwords using regular expressions.☆30Updated 4 years ago
- A shell script that mimics sudo and sends you back the password☆43Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated 2 years ago
- CVE-2020-20093; 20094; 20095; 20096, 2022-28345 RTLO Injection URI Spoofing☆89Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated last year
- Python3 Scripts for OSCP buffer overflow exploitation☆12Updated 4 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago