trickest / cveLinks
Gather and update all available and newest CVEs with their PoC.
β7,433Updated this week
Alternatives and similar repositories for cve
Users that are interested in cve are comparing it to the libraries listed below
Sorting:
- π‘ PoC auto collect from GitHub. β οΈ Be careful Malware.β7,419Updated this week
- An OOB interaction gathering server and client libraryβ4,080Updated this week
- Adversary Emulation Frameworkβ10,337Updated this week
- Community curated list of templates for the nuclei engine to find security vulnerabilities.β11,649Updated this week
- A toolkit for testing, tweaking and cracking JSON Web Tokensβ6,253Updated 7 months ago
- A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for attβ¦β5,566Updated this week
- HTTP parameter discovery suite.β5,968Updated 9 months ago
- WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.β6,034Updated 3 months ago
- ππ¦ Dalfox is a powerful open-source XSS scanner and utility focused on automation.β4,737Updated this week
- Linux privilege escalation auditing toolβ6,300Updated last year
- A fast, simple, recursive content discovery tool written in Rust.β7,280Updated 2 weeks ago
- The Havoc Frameworkβ7,992Updated 5 months ago
- Fast web fuzzer written in Goβ15,248Updated 7 months ago
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.β8,752Updated 2 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)β3,708Updated 6 months ago
- Web path scannerβ13,748Updated last month
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systemsβ12,368Updated 2 months ago
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rulesβ¦β5,921Updated last year
- Automatic SSRF fuzzer and exploitation toolβ3,427Updated 3 months ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and nβ¦β10,601Updated last week
- Monitor linux processes without root permissionsβ5,802Updated 2 years ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, fβ¦β4,314Updated last year
- Windows Exploit Suggester - Next Generationβ4,712Updated last week
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flawsβ3,812Updated 2 months ago
- Automated All-in-One OS Command Injection Exploitation Tool.β5,539Updated 2 weeks ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Toolβ4,089Updated last year
- A curated list of amazingly awesome Burp Extensionsβ3,327Updated 9 months ago
- βοΈ A curated list of CVE PoCs.β3,461Updated 3 years ago
- Everything about Web Application Firewalls (WAFs) from Security Standpoint! π₯β6,995Updated 3 months ago
- A swiss army knife for pentesting networksβ8,989Updated 2 years ago