Dy1anT / Exploit-DB-SpiderLinks
A Scrapy-based crawler for crawling Exploit Database
☆12Updated 6 years ago
Alternatives and similar repositories for Exploit-DB-Spider
Users that are interested in Exploit-DB-Spider are comparing it to the libraries listed below
Sorting:
- Some of the presentations given by me☆19Updated 2 months ago
- ☆25Updated 5 years ago
- A Simple PE File Heuristics Scanners☆52Updated 6 years ago
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆15Updated 6 years ago
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 5 years ago
- An On-The-Cloud free "greybox" box scanner for various purposes.☆14Updated 7 years ago
- Research project on heterogeneous IoT protocols modelling☆54Updated 3 years ago
- a Machine Learning powered CSRF attacks finding tool☆26Updated 6 years ago
- Creating a vulnerable environment and the PoC☆15Updated 5 years ago
- WebFuzzer - Web Application Security Scanner by Cystack Team☆25Updated 8 years ago
- ☆38Updated 5 years ago
- Checkpot Honeypot Checker☆46Updated 6 years ago
- ☆19Updated 5 years ago
- Burp Suite extension for Radamsa-powered fuzzing with Intruder☆20Updated 3 years ago
- ☆13Updated 2 years ago
- Golang based web service to scan files with yara rules☆25Updated 8 years ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆25Updated 6 years ago
- CVE-2019-12949☆26Updated 6 years ago
- Quantum Insert Backdoor POC☆11Updated 8 years ago
- Simple vulnerability scanning framework☆51Updated 9 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Updated 6 years ago
- A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.☆24Updated 6 years ago
- Botnet Simulation Framework☆76Updated 5 years ago
- ArmourBird CSF - Container Security Framework☆44Updated 3 years ago
- Perform CVE lookup on cvedetails.com☆27Updated last year
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Updated 7 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆64Updated 6 years ago
- Community-based integrated malware identification system☆82Updated 2 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆16Updated 7 years ago
- A regular expression fuzzer.☆45Updated 7 years ago