Easily scan for CVEs using nmap.
☆16Jan 13, 2022Updated 4 years ago
Alternatives and similar repositories for cvescan
Users that are interested in cvescan are comparing it to the libraries listed below
Sorting:
- Remot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to exploit a system or server that ru…☆18Jan 15, 2019Updated 7 years ago
- ALAT TOLL KEPERLUAN ONLINE☆13Jan 10, 2019Updated 7 years ago
- SelectMenu is the input form to choose from menu by arrow keys.☆23Dec 17, 2020Updated 5 years ago
- Arch Linux for gaming and game development☆29Dec 5, 2025Updated 2 months ago
- ☆10Jan 9, 2026Updated last month
- Automatic forwarding message on Telegram.☆37Jun 3, 2023Updated 2 years ago
- STM8 port of GNU binutils with link-time unused code elimination☆13Jun 22, 2023Updated 2 years ago
- ☆13Jan 28, 2024Updated 2 years ago
- ☆11Sep 22, 2025Updated 5 months ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11May 26, 2023Updated 2 years ago
- Poc of using youtube comments for C2 communications☆10Jul 6, 2021Updated 4 years ago
- ☆18Feb 9, 2026Updated 3 weeks ago
- Hacking DDR Memory Serial Presence Detect☆41Nov 8, 2017Updated 8 years ago
- ☆18Feb 11, 2026Updated 2 weeks ago
- A command line programmer interfacing for Winner Marco 800 series chips.☆10May 6, 2024Updated last year
- A simulation of the RFCTF KOTH game.☆10Aug 14, 2020Updated 5 years ago
- Small bash script for Android to enable adb (android debugging bridge) over WiFi.☆12Oct 29, 2017Updated 8 years ago
- Mindmap/CheatSheet for eLearnSecurity-PTPv5☆10Jun 18, 2020Updated 5 years ago
- This was made with the intention of providing evidence of work done towards furthering education in cyber security.☆10May 12, 2022Updated 3 years ago
- Official repository of bfdev, A C lang algorithm & container library that balances performance, cross-platform compatibility and memory s…☆15Feb 12, 2026Updated 2 weeks ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Sep 25, 2020Updated 5 years ago
- Tools for communicating with Intel Management Engine through MEI (HECI)☆13Jul 27, 2017Updated 8 years ago
- Web Vulnerability Scanner.☆13Mar 30, 2022Updated 3 years ago
- ☆11Nov 24, 2019Updated 6 years ago
- DrayTek Vigor165 stuff☆12Oct 30, 2020Updated 5 years ago
- BM3231S uart data trans☆11May 30, 2021Updated 4 years ago
- ☆13Dec 7, 2023Updated 2 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- ☆10Feb 21, 2019Updated 7 years ago
- qemu-img convert command(eg: qemu-img convert -f qcow2 -o preallocation=off -O qcow2 src.qcow2 dst.qcow2) will lost snapshots of qcow2 im…☆11Apr 1, 2023Updated 2 years ago
- UEFI keylogger prototype☆10May 10, 2017Updated 8 years ago
- Certego components library. Built on React.js + reactstrap + more.