An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and provide methods to perform searches.
☆30Nov 4, 2024Updated last year
Alternatives and similar repositories for pyExploitDb
Users that are interested in pyExploitDb are comparing it to the libraries listed below
Sorting:
- black Ip lists, dorks-collection☆16Feb 1, 2026Updated 3 weeks ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Automated pshtt, trustymail, and sslyze scanning☆30Feb 18, 2026Updated last week
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 5 years ago
- Remove Offensive and Profane Words from Wordlists☆15Jul 27, 2023Updated 2 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- CVE-2021-21978 exp☆23Mar 5, 2021Updated 4 years ago
- Dockerfile with advanced configurations for Offensive Docker.☆13Sep 18, 2020Updated 5 years ago
- A tool for detecting sensitive data in code repositories☆18Updated this week
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆17Jun 11, 2024Updated last year
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Nov 25, 2022Updated 3 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Mar 31, 2021Updated 4 years ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆19Feb 20, 2026Updated last week
- openvpn server configs☆14May 12, 2016Updated 9 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆12Feb 7, 2018Updated 8 years ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- ☆19Nov 28, 2024Updated last year
- openVAS with ansible☆21Apr 22, 2015Updated 10 years ago
- Data EXfiltration TestER☆21Aug 28, 2019Updated 6 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆41Oct 26, 2023Updated 2 years ago
- GitHub Profile Repository for Kali☆14Updated this week
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Aug 17, 2022Updated 3 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆48Feb 3, 2026Updated 3 weeks ago
- Bypassing File Upload Restriction using Magic Bytes☆22Jul 4, 2022Updated 3 years ago
- An Advanced tool to scan hundreds of IP's in Seconds for CVE's, Open Ports And Web Technologies.☆22Apr 30, 2022Updated 3 years ago
- Polymorphic ELF Virus☆18Mar 19, 2022Updated 3 years ago
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Feb 1, 2019Updated 7 years ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆25Sep 29, 2023Updated 2 years ago
- ☆22Jun 28, 2016Updated 9 years ago
- Notes only☆19May 2, 2022Updated 3 years ago
- Scripts useful in cracking the Vulnhub Lab named View2aKill: 1☆26Feb 1, 2020Updated 6 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Apr 4, 2023Updated 2 years ago
- Pcapy-NG is a Python extension module that interfaces with the libpcap packet capture library.☆26Jan 6, 2026Updated last month
- Mailer is python3 script use for sending spear-phishing to target email...It was created by Spider Anongreyhat☆30Apr 18, 2022Updated 3 years ago
- Source of swisskyrepo.github.io - Public☆27Jul 12, 2025Updated 7 months ago
- Impacket is a collection of Python classes for working with network protocols.☆31Jun 27, 2024Updated last year
- AnonCrypt ciphers and diciphers your messages or strings which makes you send texts to people without them understanding it. Anoncrypt us…☆27Jun 26, 2024Updated last year
- Search for leaked creadentials on pwndb using the command line and tor.☆25Jan 31, 2019Updated 7 years ago
- Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.☆39Sep 15, 2022Updated 3 years ago