trickest / cve
Gather and update all available and newest CVEs with their PoC.
β6,799Updated this week
Alternatives and similar repositories for cve:
Users that are interested in cve are comparing it to the libraries listed below
- π‘ PoC auto collect from GitHub. β οΈ Be careful Malware.β6,774Updated this week
- A fast, simple, recursive content discovery tool written in Rust.β6,308Updated this week
- Adversary Emulation Frameworkβ9,018Updated 2 weeks ago
- Monitor linux processes without root permissionsβ5,258Updated 2 years ago
- Linux privilege escalation auditing toolβ5,843Updated last year
- HTTP parameter discovery suite.β5,502Updated 3 weeks ago
- An OOB interaction gathering server and client libraryβ3,636Updated this week
- Linux enumeration tool for pentesting and CTFs with verbosity levelsβ3,540Updated last year
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)β17,026Updated 2 weeks ago
- Scripted Local Linux Enumeration & Privilege Escalation Checksβ7,242Updated last year
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, fβ¦β4,151Updated 5 months ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.β5,352Updated 9 months ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)β3,238Updated 4 months ago
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systemsβ11,348Updated 4 months ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)β7,359Updated last month
- Server-Side Template Injection and Code Injection Detection and Exploitation Toolβ3,888Updated 10 months ago
- A swiss army knife for pentesting networksβ8,619Updated last year
- Rockyou for web fuzzingβ2,728Updated 2 weeks ago
- ππ¦ Dalfox is a powerful open-source XSS scanner and utility focused on automation.β4,003Updated this week
- A toolkit for testing, tweaking and cracking JSON Web Tokensβ5,664Updated 7 months ago
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rulesβ¦β5,633Updated 8 months ago
- Windows Exploit Suggester - Next Generationβ4,349Updated this week
- The Havoc Frameworkβ7,331Updated last month
- The ultimate WinRM shell for hacking/pentestingβ4,756Updated 3 months ago
- Automatic SSRF fuzzer and exploitation toolβ3,109Updated 2 weeks ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!β1,879Updated last year
- βοΈ A curated list of CVE PoCs.β3,369Updated 3 years ago
- Red Teaming Tactics and Techniquesβ4,181Updated 6 months ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifiβ¦β2,287Updated 2 months ago
- Community curated list of templates for the nuclei engine to find security vulnerabilities.β9,794Updated this week