vulnerability
Here are 115 public repositories matching this topic...
Runs Trivy as GitHub action to scan your Docker container image for vulnerabilities
-
Updated
Mar 4, 2026 - Shell
An automation tool that scans sub-domains, sub-domain takeover, then filters out XSS, SSTI, SSRF, and more injection point parameters and scans for some low hanging vulnerabilities automatically.
-
Updated
Jul 4, 2023 - Shell
Escalation of Privilege to the root through sudo binary with chroot option. CVE-2025-32463
-
Updated
Nov 19, 2025 - Shell
A script to automate privilege escalation with CVE-2023-22809 vulnerability
-
Updated
Feb 15, 2023 - Shell
OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).
-
Updated
Nov 15, 2019 - Shell
Designed to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .onion
-
Updated
Jan 2, 2022 - Shell
ScanPro - NMap Scanning Scripts ~ Network Mapper
-
Updated
Dec 7, 2025 - Shell
Automated privilege escalation of the world's most popular Docker images.
-
Updated
Sep 25, 2023 - Shell
Kubernetes security and vulnerability tools and utilities.
-
Updated
Jun 14, 2021 - Shell
XSS Finder Via SSTI
-
Updated
Sep 14, 2023 - Shell
ProxyToken (CVE-2021-33766) : An Authentication Bypass in Microsoft Exchange Server POC exploit
-
Updated
Oct 14, 2021 - Shell
Privilege escalation to root using sudo chroot, NO NEED for gcc installed.
-
Updated
Oct 6, 2025 - Shell
Hack Cctv Vuln 2020
-
Updated
Apr 6, 2020 - Shell
A collection of awesome security hardening software, libraries, learning tutorials & documents, e-books, best practices, checklists, benchmarks about hardening in Cybersecurity
-
Updated
Jan 27, 2022 - Shell
Privilege escalation in Docker
-
Updated
Jun 30, 2022 - Shell
A learning and testing environment for web application hacking and pentesting.
-
Updated
Jan 2, 2021 - Shell
HideMePlease is a new generation tool to hide phising web links into legitimate web links with original domains (eg: facebook.com, instagram.com) using ccTLD Disguise method.
-
Updated
Jun 3, 2024 - Shell
Improve this page
Add a description, image, and links to the vulnerability topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the vulnerability topic, visit your repo's landing page and select "manage topics."