A Scrapy-based crawler for crawling Exploit Database
☆12Jan 6, 2019Updated 7 years ago
Alternatives and similar repositories for Exploit-DB-Spider
Users that are interested in Exploit-DB-Spider are comparing it to the libraries listed below
Sorting:
- Python script to find subdomains☆11Aug 22, 2025Updated 6 months ago
- a tool for downloading the BugTraq Ids database☆13May 22, 2023Updated 2 years ago
- Red Team Server (RTS)☆16Mar 8, 2024Updated last year
- ☆19Dec 19, 2019Updated 6 years ago
- A tool for fuzzing for ports that allow outgoing connections☆17Oct 15, 2018Updated 7 years ago
- HTTP sniffer, output json format data.☆22Jun 30, 2015Updated 10 years ago
- Tool for analyzing git log messages and diffs.☆22Jan 13, 2021Updated 5 years ago
- ☆23Nov 16, 2023Updated 2 years ago
- ☆26Oct 13, 2015Updated 10 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26May 31, 2016Updated 9 years ago
- ☆25Feb 21, 2019Updated 7 years ago
- A Microsoft Windows service to provide telemetry on Windows executable memory page changes to facilitate threat detection☆32Oct 7, 2020Updated 5 years ago
- Library for preprocessing java source code into Augmented ASTs, as per the paper Open Vocabulary Learning on Source Code with a Graph-Str…☆21Oct 22, 2018Updated 7 years ago
- TypeSan checks casts in C++ code - code released for CCS 2016☆36May 5, 2021Updated 4 years ago
- This is a deep learning dataset for cross-version binary code similarity detection.☆27Nov 7, 2018Updated 7 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Oct 23, 2017Updated 8 years ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- Structured Information on State and Evolution of Dockerfiles - Online Appendix☆10Mar 16, 2018Updated 7 years ago
- PEVuln: A Benchmark Dataset for Using Machine Learning to Detect Vulnerabilities in PE Malware☆14Nov 26, 2025Updated 3 months ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- RSMP Signal Exchange List (SXL) for Traffic Controllers☆12Dec 19, 2025Updated 2 months ago
- Augmenting Static Analysis Using Pintool: Ablation☆39Aug 4, 2016Updated 9 years ago
- Python bindings for Shimple/Jimple IR from Soot.☆43Feb 5, 2026Updated 3 weeks ago
- Compiler Fingerprinting☆14Apr 24, 2015Updated 10 years ago
- A signature updater and optional private mirroring server for ClamAV☆10Aug 2, 2017Updated 8 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Jan 13, 2022Updated 4 years ago
- Experimental python3.x based ICMP bind shell listener using scapy and windows 'compatible'☆10May 29, 2020Updated 5 years ago
- Mad (╯°□°)╯'ing☆10Nov 22, 2022Updated 3 years ago
- A library for parsing security advisories☆13Feb 5, 2026Updated 3 weeks ago
- ☆10Dec 3, 2021Updated 4 years ago
- Simple interface to libmagic for Go Programming Language☆13Jan 10, 2021Updated 5 years ago
- Scan for and exploit the zerologon vulnerability.☆10Sep 15, 2020Updated 5 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- ☆12Nov 2, 2015Updated 10 years ago
- ☆12Nov 14, 2023Updated 2 years ago
- Let's Snatch The Admin Panel Of Any Website In Seconds.☆17Feb 24, 2020Updated 6 years ago
- nsq client for c language☆13Dec 2, 2017Updated 8 years ago
- ☆12Sep 25, 2020Updated 5 years ago
- AIxCC: automated vulnerability repair via LLMs, search, and static analysis☆11Jul 16, 2024Updated last year