projectdiscovery / cvemap
Navigate the CVE jungle with ease.
☆1,865Updated this week
Alternatives and similar repositories for cvemap:
Users that are interested in cvemap are comparing it to the libraries listed below
- The Network Execution Tool☆3,621Updated this week
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,035Updated this week
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,154Updated 7 months ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆1,924Updated this week
- A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automat…☆1,760Updated this week
- 🚀 Caido releases, wiki and roadmap☆1,301Updated this week
- A list of open source web security scanners☆1,013Updated 5 months ago
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,529Updated 3 weeks ago
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,034Updated 7 months ago
- Check your WAF before an attacker does☆1,340Updated last month
- A Burp Suite extension that integrates OpenAI's GPT to perform an additional passive scan for discovering highly bespoke vulnerabilities …☆2,065Updated 8 months ago
- dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers.☆2,279Updated this week
- A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for att…☆4,993Updated this week
- An OOB interaction gathering server and client library☆3,619Updated this week
- Automatic SSTI detection tool with interactive interface☆991Updated 4 months ago
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,396Updated this week
- Active Directory and Internal Pentest Cheatsheets☆1,268Updated last week
- Arsenal is just a quick inventory and launcher for hacking programs☆3,316Updated 3 months ago
- The useful exploit finder☆801Updated 10 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆2,681Updated 3 weeks ago
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,492Updated 9 months ago
- Automating situational awareness for cloud penetration tests.☆2,040Updated 2 months ago
- Six Degrees of Domain Admin☆1,411Updated this week
- A multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,548Updated this week
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Re…☆1,456Updated last month
- Rockyou for web fuzzing☆2,718Updated this week
- The Havoc Framework☆7,283Updated last month
- Real-world infosec wordlists, updated regularly☆1,451Updated this week
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆564Updated 2 weeks ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆3,182Updated last week