Dy1anT / Exploit-DB-Spider
A Scrapy-based crawler for crawling Exploit Database
☆12Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for Exploit-DB-Spider
- Burp Suite extension for Radamsa-powered fuzzing with Intruder☆18Updated 2 years ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆26Updated 5 months ago
- ☆11Updated 2 years ago
- Some of the presentations given by me☆16Updated last week
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Updated 6 years ago
- WebFuzzer - Web Application Security Scanner by Cystack Team☆27Updated 7 years ago
- Abusing SketchUp to make persistence on Windows☆20Updated 5 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 7 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated 10 months ago
- PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.☆14Updated 5 years ago
- ExtendedMacro - BurpSuite plugin providing extended macro functionality☆13Updated 3 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- ☆25Updated 4 years ago
- Repository of Yara rules created by the Stratosphere team☆26Updated 3 years ago
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆15Updated 5 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- ssdeep cluster analysis for malware files☆29Updated 4 years ago
- A Simple PE File Heuristics Scanners☆50Updated 5 years ago
- Android Malware Tracker☆26Updated 7 months ago
- Proof of Concept's provided by Source Incite☆37Updated 7 years ago
- Research project on Automating Exploitation on Format String Vulnerabilities☆8Updated 8 years ago
- Simple WebSocket fuzzer☆32Updated last year
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 4 years ago
- Useful Windows and AD tools☆15Updated 2 years ago
- Exploit for win10 SMB3.1☆16Updated 4 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- My fuzzing workshop from PHDays9☆27Updated 5 years ago
- Exfiltration based on custom X509 certificates☆26Updated 8 months ago