trickest / cveLinks
Gather and update all available and newest CVEs with their PoC.
β7,058Updated this week
Alternatives and similar repositories for cve
Users that are interested in cve are comparing it to the libraries listed below
Sorting:
- π‘ PoC auto collect from GitHub. β οΈ Be careful Malware.β7,053Updated this week
- Adversary Emulation Frameworkβ9,595Updated this week
- Linux privilege escalation auditing toolβ6,032Updated last year
- An OOB interaction gathering server and client libraryβ3,823Updated this week
- Server-Side Template Injection and Code Injection Detection and Exploitation Toolβ3,964Updated last year
- HTTP parameter discovery suite.β5,721Updated 4 months ago
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systemsβ11,805Updated 8 months ago
- Monitor linux processes without root permissionsβ5,523Updated 2 years ago
- WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.β5,731Updated 6 months ago
- "Can I take over XYZ?" β a list of services and how to claim (sub)domains with dangling DNS records.β5,231Updated 4 months ago
- A swiss army knife for pentesting networksβ8,802Updated last year
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password π‘οΈβ6,139Updated last month
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and nβ¦β9,993Updated this week
- Automatic SSRF fuzzer and exploitation toolβ3,236Updated 4 months ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findinβ¦β6,421Updated last month
- A fast, simple, recursive content discovery tool written in Rust.β6,727Updated 2 months ago
- Scripted Local Linux Enumeration & Privilege Escalation Checksβ7,437Updated last year
- A Tool for Domain Flyoversβ5,788Updated 3 years ago
- In-depth attack surface mapping and asset discoveryβ13,183Updated last week
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies andβ¦β3,817Updated 3 years ago
- A toolkit for testing, tweaking and cracking JSON Web Tokensβ5,938Updated 2 months ago
- Red Teaming Tactics and Techniquesβ4,302Updated 10 months ago
- Web path scannerβ13,066Updated 2 weeks ago
- Fast web fuzzer written in Goβ14,211Updated 2 months ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)β3,449Updated 3 weeks ago
- Community curated list of templates for the nuclei engine to find security vulnerabilities.β10,378Updated this week
- Windows Exploit Suggester - Next Generationβ4,497Updated last week
- Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.β4,428Updated 6 months ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)β7,704Updated last week
- ππ¦ Dalfox is a powerful open-source XSS scanner and utility focused on automation.β4,372Updated this week