qazbnm456 / awesome-cve-poc
✍️ A curated list of CVE PoCs.
☆3,324Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for awesome-cve-poc
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,684Updated 3 years ago
- Wiki to collect Red Team infrastructure hardening resources☆4,152Updated 7 months ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆3,971Updated last year
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆3,794Updated 6 months ago
- PENTEST-WIKI is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with othe…☆3,472Updated last year
- A curated list of amazingly awesome Burp Extensions☆3,000Updated this week
- Linux privilege escalation auditing tool☆5,660Updated 9 months ago
- Git All the Payloads! A collection of web attack payloads.☆3,630Updated last year
- linux-kernel-exploits Linux平台提权漏洞集合☆5,292Updated 4 years ago
- A swiss army knife for pentesting networks☆8,457Updated 11 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆4,996Updated 3 weeks ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆8,804Updated 6 months ago
- Privilege Escalation Project - Windows / Linux / Mac☆2,449Updated last month
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,422Updated 2 weeks ago
- List of Awesome Red Teaming Resources☆6,908Updated 10 months ago
- Red Teaming Tactics and Techniques☆4,065Updated 2 months ago
- An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.☆5,585Updated 5 months ago
- Monitor linux processes without root permissions☆4,961Updated last year
- Automated All-in-One OS Command Injection Exploitation Tool.☆4,613Updated this week
- Windows Exploit Suggester - Next Generation☆4,230Updated this week
- Vulnerability Labs for security analysis☆1,158Updated 3 years ago
- A Tool for Domain Flyovers☆5,644Updated 2 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,040Updated last year
- The cheat sheet about Java Deserialization vulnerabilities☆3,037Updated last year
- Web application fuzzer☆5,968Updated 3 months ago
- awesome list of browser exploitation tutorials☆2,058Updated last year
- Automatic SSRF fuzzer and exploitation tool☆3,000Updated 5 months ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,461Updated 4 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆9,106Updated 2 months ago
- windows-kernel-exploits Windows平台提权漏洞集合☆8,116Updated 3 years ago