Nmap script that scans for probable vulnerabilities based on services discovered in open ports.
☆222Mar 16, 2025Updated last year
Alternatives and similar repositories for CVEScannerV2
Users that are interested in CVEScannerV2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- NVD semiupdated database to be used with CVEScannerV2☆17Mar 15, 2026Updated last week
- burpsuite extension to analyze javascript files using semgrep☆12Feb 3, 2025Updated last year
- This tool is intended for bounty hunters, the script installs and launches the best set of tools for expanding the attack surface, for W…☆12Apr 22, 2024Updated last year
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year
- Top passwords as per HaveIBeenPwned☆33Mar 12, 2026Updated 2 weeks ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated last year
- Friendly graphical output of the nmap tool that allows filtering by open ports☆190Jul 3, 2022Updated 3 years ago
- Repository contains a collection of scripts designed to demonstrate and exploit various vulnerabilities in HTTP and related protocols☆30Nov 24, 2025Updated 4 months ago
- Scan for and exploit the zerologon vulnerability.☆10Sep 15, 2020Updated 5 years ago
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆16Apr 5, 2024Updated last year
- nmap nse script for scan a whole country☆13Jun 28, 2022Updated 3 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆129Dec 2, 2023Updated 2 years ago
- Weekly updated list of missing CVEs in nuclei templates official repository. Mainly built for bug bounty, but useful for penetration test…☆427Mar 16, 2026Updated last week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Apache OFBiz RCE Scanner & Exploit (CVE-2024-38856)☆49Oct 2, 2024Updated last year
- ☆28Sep 9, 2024Updated last year
- ☆41Mar 12, 2025Updated last year
- A python based utility to download animes for offline viewing ¯\(ツ)/¯☆13Mar 22, 2021Updated 5 years ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆182May 19, 2025Updated 10 months ago
- Online-Crawler-Wayback-Machine☆27Oct 15, 2024Updated last year
- Mass Hunting & Exploitation PoC for CVE-2025-55182 & CVE-2025-66478☆38Dec 7, 2025Updated 3 months ago
- OsintIA_Tools.py is an automated tool for collecting and analyzing public information that combines OSINT techniques with artificial inte…☆61Mar 11, 2025Updated last year
- Nautilus is a Rust-based framework for building decentralized networks and secure communication systems. It focuses on modularity, scalab…☆31Mar 5, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆13Mar 6, 2025Updated last year
- ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windo…☆188Jul 25, 2024Updated last year
- Burp plugin for jxscout☆20May 12, 2025Updated 10 months ago
- Linux-based botnet builder designed for creating advanced botnet payloads.☆106Nov 2, 2025Updated 4 months ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆32Jun 2, 2024Updated last year
- This repository contains the best fuzzing wordlist files☆34Dec 2, 2024Updated last year
- 🔬Collection of malware, ransomware, RATs, botnets, stealers, etc.☆237Dec 15, 2021Updated 4 years ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Feb 4, 2026Updated last month
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- PacketSpy☆157May 31, 2024Updated last year
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- 🧸 fully isolated honeypot ssh server using thrussh☆279Nov 19, 2024Updated last year
- A Simple JS code to keylogger data and send it to the personal server☆31Dec 30, 2024Updated last year
- Payload for jpg file☆60Aug 17, 2024Updated last year
- ☆197Jun 11, 2024Updated last year
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆26Nov 2, 2025Updated 4 months ago