An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and provide methods to perform searches.
☆31Nov 4, 2024Updated last year
Alternatives and similar repositories for pyExploitDb
Users that are interested in pyExploitDb are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python 3 script for interacting with Shodan API☆20Nov 4, 2024Updated last year
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- Nessus Cheat Sheet in HTML, PDF, PNG, ADOC☆12Apr 10, 2022Updated 4 years ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- Display an emoji based on time since your last commit to a git repo☆16Apr 29, 2013Updated 12 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- black Ip lists, dorks-collection☆17Apr 1, 2026Updated last week
- Dockerfile with advanced configurations for Offensive Docker.☆13Sep 18, 2020Updated 5 years ago
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆17Jun 11, 2024Updated last year
- Helpful tools for interacting with a GoPhish phishing instance☆48Feb 3, 2026Updated 2 months ago
- Open Source Intelligence - Buscando informações sobre infraestruturas☆10Feb 13, 2019Updated 7 years ago
- The TRUE Decentralized Static Microblog☆18Apr 10, 2022Updated 4 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 6 years ago
- The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Ze…☆36Updated this week
- A Bash script to obfuscate Bash script☆40Sep 13, 2020Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A curated list of tools and techniques written from experience in weaponization of malware☆41Oct 26, 2023Updated 2 years ago
- Zone-H Cybercrime Archive Telegram Monitoring Bot☆14Mar 26, 2026Updated 2 weeks ago
- https://medium.com/@anderson_pablo/iptv-smarters-exploit-cve-2020-9380-22d4b21f5da7☆13May 17, 2023Updated 2 years ago
- Data EXfiltration TestER☆21Aug 28, 2019Updated 6 years ago
- Execute embedded Mimikatz☆13Nov 24, 2021Updated 4 years ago
- CVE-2021-21978 exp☆23Mar 5, 2021Updated 5 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Mar 31, 2021Updated 5 years ago
- GitHub Profile Repository for Kali☆14Apr 4, 2026Updated last week
- openVAS with ansible☆21Apr 22, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A tool for detecting sensitive data in code repositories☆18Mar 26, 2026Updated 2 weeks ago
- Azure AD (Entra ID) enumeration tool. Find related domains and tenant information in a simple way.☆35Oct 4, 2024Updated last year
- Libreoffice help Read-only Mirror - no pull request☆26Updated this week
- A training course on Web Security, Exploit Development and Source Code Auditing from 2009.☆12Feb 15, 2022Updated 4 years ago
- List of payloads for BurpSuite intruder. Payloads gathered from Swisskyrepos PayloadsAllTheThings☆37Apr 2, 2026Updated last week
- Impacket is a collection of Python classes for working with network protocols.☆31Jun 27, 2024Updated last year
- Qakbot Registry Key Configuration Decryptor☆14Dec 20, 2021Updated 4 years ago
- ☆20Jun 15, 2022Updated 3 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Apr 4, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A malicious .cab creation tool for CVE-2021-40444☆13Sep 12, 2021Updated 4 years ago
- AI Substitutor is an extension for Burp Suite that uses AI functionality to substitute values of HTTP request parameters and headers.☆28Apr 30, 2025Updated 11 months ago
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Nov 25, 2022Updated 3 years ago
- BurpSuite using the document and some extensions☆73Jul 11, 2020Updated 5 years ago
- Scripts useful in cracking the Vulnhub Lab named View2aKill: 1☆26Feb 1, 2020Updated 6 years ago
- decompiled pegasus_spyware☆14Jul 31, 2021Updated 4 years ago
- DPE - Default Password Enumeration☆37Jun 3, 2013Updated 12 years ago