rapid7 / cvelist
Pilot program for CVE submission through GitHub
☆21Updated last year
Alternatives and similar repositories for cvelist:
Users that are interested in cvelist are comparing it to the libraries listed below
- Repo for proof of concept exploits and tools.☆56Updated 4 years ago
- Clear All Windows System Logs - AntiForensics☆53Updated 9 years ago
- Remove individual lines from Windows Event Viewer Log (EVT) files☆44Updated 4 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Updated 5 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆42Updated 7 years ago
- Scanning for Remote Desktop Gateways (Potentially unpatched CVE-2020-0609 and CVE-2020-0610)☆40Updated 4 years ago
- ☆31Updated 5 years ago
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 10 years ago
- ☆50Updated 4 years ago
- RDP POC☆19Updated 5 years ago
- ☆17Updated 4 months ago
- Dependencies for Veil 3☆18Updated 8 years ago
- jgraphx 4.0.4 build for cs project☆22Updated 4 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- cobalt strike stuff I have gathered from around github☆31Updated 7 years ago
- This is an implementation of the CVE-2020-0796 aka SMBGhost vulnerability, compatible with the Metasploit Framework☆19Updated 4 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Automated information gathering tool for pentest☆54Updated 8 years ago
- Powershell SMBv3 Compression checker☆28Updated 2 years ago
- ☆25Updated 4 years ago
- A collection of tools found on Github☆26Updated 9 years ago
- Metasploit module for massive Denial of Service using #Bluekeep vector.☆25Updated 5 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆46Updated 5 years ago
- initial commit☆44Updated 5 months ago
- Curated list of public penetration testing reports released by several consulting firms☆12Updated 8 years ago
- Linux AV tests☆13Updated 6 years ago
- Metasploit Framework☆31Updated 5 years ago
- Shellcode Encrypter & Decrypter via XOR Cipher☆59Updated 5 years ago
- shell over icmp☆31Updated 11 years ago