trickest / cveLinks
Gather and update all available and newest CVEs with their PoC.
β7,471Updated this week
Alternatives and similar repositories for cve
Users that are interested in cve are comparing it to the libraries listed below
Sorting:
- π‘ PoC auto collect from GitHub. β οΈ Be careful Malware.β7,457Updated this week
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systemsβ12,442Updated 3 months ago
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rulesβ¦β5,925Updated last year
- Linux privilege escalation auditing toolβ6,333Updated last year
- Adversary Emulation Frameworkβ10,436Updated this week
- A toolkit for testing, tweaking and cracking JSON Web Tokensβ6,293Updated 8 months ago
- Community curated list of templates for the nuclei engine to find security vulnerabilities.β11,757Updated this week
- An OOB interaction gathering server and client libraryβ4,102Updated this week
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)β19,012Updated this week
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findinβ¦β7,022Updated last week
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.β5,845Updated last month
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)β8,222Updated 3 weeks ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password π‘οΈβ6,352Updated 2 weeks ago
- Monitor linux processes without root permissionsβ5,823Updated 2 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checksβ7,768Updated 2 years ago
- HTTP parameter discovery suite.β5,990Updated 10 months ago
- WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.β6,103Updated 3 months ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and nβ¦β10,711Updated this week
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)β3,733Updated 6 months ago
- Fast web fuzzer written in Goβ15,349Updated 8 months ago
- game of active directoryβ7,284Updated 5 months ago
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Eβ¦β8,375Updated last month
- Windows Exploit Suggester - Next Generationβ4,726Updated last week
- Linux enumeration tool for pentesting and CTFs with verbosity levelsβ3,818Updated 2 years ago
- The Havoc Frameworkβ8,046Updated 2 weeks ago
- ππ¦ Dalfox is a powerful open-source XSS scanner and utility focused on automation.β4,761Updated this week
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enablβ¦β26,356Updated this week
- A swiss army knife for pentesting networksβ9,010Updated 2 years ago
- In-depth attack surface mapping and asset discoveryβ13,923Updated this week
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.β8,769Updated 2 years ago