trickest / cve
Gather and update all available and newest CVEs with their PoC.
β6,936Updated this week
Alternatives and similar repositories for cve:
Users that are interested in cve are comparing it to the libraries listed below
- π‘ PoC auto collect from GitHub. β οΈ Be careful Malware.β6,886Updated this week
- Community curated list of templates for the nuclei engine to find security vulnerabilities.β10,086Updated this week
- Adversary Emulation Frameworkβ9,281Updated this week
- HTTP parameter discovery suite.β5,612Updated 2 months ago
- A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for attβ¦β5,129Updated this week
- Fast web fuzzer written in Goβ13,902Updated 2 weeks ago
- βοΈ A curated list of CVE PoCs.β3,395Updated 3 years ago
- An OOB interaction gathering server and client libraryβ3,739Updated this week
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, fβ¦β4,211Updated 7 months ago
- Linux privilege escalation auditing toolβ5,926Updated last year
- ππ¦ Dalfox is a powerful open-source XSS scanner and utility focused on automation.β4,239Updated this week
- Fast passive subdomain enumeration tool.β11,618Updated this week
- A toolkit for testing, tweaking and cracking JSON Web Tokensβ5,793Updated last week
- WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.β5,624Updated 4 months ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findinβ¦β6,238Updated this week
- Monitor linux processes without root permissionsβ5,407Updated 2 years ago
- Red Teaming Tactics and Techniquesβ4,244Updated 8 months ago
- Windows Exploit Suggester - Next Generationβ4,416Updated last week
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.β5,477Updated 8 months ago
- A swiss army knife for pentesting networksβ8,705Updated last year
- Scripted Local Linux Enumeration & Privilege Escalation Checksβ7,339Updated last year
- A curated list of amazingly awesome Burp Extensionsβ3,166Updated 2 months ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)β7,511Updated last week
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.β5,442Updated last month
- In-depth attack surface mapping and asset discoveryβ12,935Updated this week
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rulesβ¦β5,666Updated 9 months ago
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enablβ¦β23,200Updated this week
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)β3,342Updated 6 months ago
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.β8,514Updated last year
- Server-Side Template Injection and Code Injection Detection and Exploitation Toolβ3,929Updated last year