🔍 Customize your new tab with Hacker Search, a modern Chrome extension featuring a matrix-inspired design and powerful search widgets.
-
Updated
Nov 11, 2025 - JavaScript
The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures. The United States’ National Cybersecurity FFRDC, operated by The Mitre Corporation, maintains the system, with funding from the US National Cyber Security Division of the US Department of Homeland Security
🔍 Customize your new tab with Hacker Search, a modern Chrome extension featuring a matrix-inspired design and powerful search widgets.
💎 RapidFort hardened secure images
Collection of penetration test reports and pentest report templates. Published by the the best security companies in the world.
Vulnogram is the tool for reserving, managing, and publishing CVEs. Get started at vulnogram.org or deploy Docker edition for full enterprise features.
CLI tool to map software packages to CPEs for accurate SBOM generation
Development of the NIST vulnerability data ontology (Vulntology).
CVSS (Common Vulnerability Scoring System) Calculator
This repository contains multiple exploits I have written for various CVEs and CTFs
Cybersecurity, Vulnerabilities and Exploits
MCP server for CIRCL CVE Search API with intelligent risk assessment and comprehensive vulnerability analysis.
Check CVSS v3.1 and EPSS scores for a given CVE ID and whether its in CISA KEV catalog
A command line CWE discovery tool based on OWASP / CAPSEC database of Common Weakness Enumeration.
POC for Roundcube vulnerabilities CVE-2024-42008 and CVE-2024-42010
Fork to fix CVE-2024-21526 (https://nvd.nist.gov/vuln/detail/CVE-2024-21526) Output PCM audio data to the speakers, so speaker can be used in BrowserBox
A basic proof of concept of the CVE-2025-29927 vulnerability that allows to bypass the middleware scripts.
This repository contains a proof of concept (POC) and an exploit script for CVE-2025-29927, a critical vulnerability in Next.js that allows attackers to bypass authorization checks implemented in middleware.