stratosphereips / nist-cve-search-toolLinks
Tapir: a tool to search through NIST CVE database, with cache and regex.
☆16Updated 2 years ago
Alternatives and similar repositories for nist-cve-search-tool
Users that are interested in nist-cve-search-tool are comparing it to the libraries listed below
Sorting:
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆33Updated 3 years ago
- Basic Dart reverse shell code☆21Updated last year
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆20Updated 4 years ago
- Python script to exploit CVE-2022-22954 and then exploit CVE-2022-22960☆2Updated 3 years ago
- Nmap script to check vulnerability CVE-2021-21972☆28Updated 4 years ago
- Port forwarding via MSRPC (445/tcp) [WIP]☆33Updated 3 years ago
- Writeup of CVE-2020-15906☆48Updated 4 years ago
- A basic proxylogon scanner☆27Updated 3 years ago
- CVE-2021-26855: PoC (Not a HoneyPoC for once!)☆27Updated 2 months ago
- Lexmark CVE-2023-26067☆26Updated last year
- ☆19Updated 4 years ago
- Router socks. One port socks for all the others.☆69Updated last year
- an Evil Java RMI Registry.☆50Updated 2 years ago
- Simple Honeypot for Atlassian Confluence (CVE-2022-26134)☆20Updated 3 years ago
- Exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager☆15Updated 2 years ago
- PoC for CVE-2021-3129 (Laravel)☆13Updated 3 years ago
- ☆54Updated 4 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆43Updated 3 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆69Updated 5 years ago
- client-side prototype pullution vulnerability scanner☆46Updated 3 years ago
- Ansible Cobalt Strike (Docker)☆15Updated 3 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- ☆12Updated last year
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆37Updated 3 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆14Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Analyzing AD domains for security risks related to user accounts☆64Updated 2 years ago
- Left To My Own Devices - NT hash tools☆33Updated 2 years ago
- ☆18Updated 4 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆22Updated last year