Exploit Eye searches for vulnerabilities and exploits using keywords you specify. Get CVE details from NVD, working exploits from Exploit-DB, and security tools from GitHub - all in one tool. Search once, get complete results. Author: Jolanda de Koff
☆77Apr 9, 2026Updated this week
Alternatives and similar repositories for exploit-eye
Users that are interested in exploit-eye are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This Python script aims to enhance your online privacy and security by automatically rotating your DNS settings at a set interval (defaul…☆36Apr 1, 2026Updated last week
- How cool would it be to learn Linux through the man pages To make it even more fun, I made this script with various options and with a co…☆40Jan 8, 2022Updated 4 years ago
- Blue Eye is a python Recon Toolkit script. It shows ports and headers. Subdomain resolves to the IP addresses, company email addresses an…☆189Apr 1, 2026Updated last week
- 802.11 Attack Tool☆15Updated this week
- Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release. Ghost Eye is an Information Gathering Tool I made in python 3…☆502Apr 1, 2026Updated last week
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆17Jan 9, 2025Updated last year
- A small end-to-end prober and Prometheus stats exporter for a Matrix homeserver☆11Oct 26, 2023Updated 2 years ago
- Solana Copy Trading Bot, This Solana copy trading bot uses gRPC and ShredStream for ultra-low latency. 0 block auto copy trading, frontru…☆21Aug 4, 2025Updated 8 months ago
- GitHub CVE Repository Hunt☆17Jul 23, 2024Updated last year
- Creating a pocket-sized network pentesting device, offering standalone power, an LCD touch display, and flexibility to conduct on-the-go …☆50Jan 19, 2025Updated last year
- Download INE courses including labs, exercises, quizzes, slides, and, videos!☆45Dec 20, 2025Updated 3 months ago
- Hacking Tool!! This Tools help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery…☆19Dec 23, 2024Updated last year
- Objectify-s3 is a tool that recursively checks AWS S3 buckets and objects for misconfigured permissions.☆15Mar 1, 2026Updated last month
- ☆20Nov 27, 2025Updated 4 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.☆36Feb 5, 2026Updated 2 months ago
- Showcasing the design patterns you can use alongside Model-View-ViewModel (MVVM).☆13Apr 21, 2021Updated 4 years ago
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆44Jan 18, 2026Updated 2 months ago
- Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with…☆15Jan 7, 2026Updated 3 months ago
- The Dictionary service provides access to the data dictionary and edge dictionary. These services provide metadata about fields that are …☆23Mar 11, 2025Updated last year
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆17Oct 28, 2023Updated 2 years ago
- Reporting Modules for Issabel. CDR, Billing and Trunk usage reports.☆15Jun 18, 2024Updated last year
- Some of the gf patterns which i use☆44Jan 19, 2022Updated 4 years ago
- Turn your Solana Seeker (or any Android phone) into a 24/7 personal AI agent☆93Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.☆33Apr 19, 2024Updated last year
- A k6 extension for Diameter protocol☆23Oct 15, 2025Updated 5 months ago
- LLFuzz: An Over-the-Air Dynamic Testing Framework for Cellular Baseband Lower Layers☆56Mar 20, 2026Updated 3 weeks ago
- External tool for WebBreacher/WhatsMyName project. Client supports 'request headers' and POST requests. The script was prepared not only …☆15Jun 7, 2024Updated last year
- Solutions Widgets for use in the ArcGIS WPF Operations Dashboard.☆18Aug 28, 2024Updated last year
- Audit agent skill definitions for security, completeness, and compatibility across Codex, Claude Code, OpenClaw, and more☆37Feb 10, 2026Updated 2 months ago
- Comprehensive course materials for 'Linux for Cyber Security', covering everything from basic Linux fundamentals to advanced security pra…☆16Sep 28, 2024Updated last year
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 8 months ago
- End-to-End Encrypted Messaging via GitHub Gists☆29Apr 14, 2025Updated 11 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Learn how to automate XSS, SSRF, LFI, SQLI, NoSQLi☆44Jul 9, 2021Updated 4 years ago
- NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive K…☆13Jan 10, 2021Updated 5 years ago
- A tool to view the total transactions, received, sent, and current balance of Bitcoin wallets 👁☆20Aug 19, 2025Updated 7 months ago
- Agentic Web App Hacker Proof of Concept☆15Apr 9, 2025Updated last year
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- A self-hosted AI workspace that merges the rich React frontend of Tiger Cowork with the advanced agent architecture of OpenClaw — served …☆26Mar 13, 2026Updated 3 weeks ago
- WPA Attack - Easy breaking WPA WPA2 networks by typing one command☆21Jun 15, 2015Updated 10 years ago