Shivangx01b / Exploitdb-searchLinks
Exploitdb website search module written in python to ease you task ... No local db for exploitdb is need ...It just uses google dorks and some scrapping to make the exploit searching easy as searcsploit
☆12Updated 5 years ago
Alternatives and similar repositories for Exploitdb-search
Users that are interested in Exploitdb-search are comparing it to the libraries listed below
Sorting:
- Automate the creation of Backdoors and postexplotation activities☆22Updated 3 years ago
- Checks if a windows machine with the smb service actve is vulnerable to the CVEs of a CSV file passed as argument to the script☆13Updated 3 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- A tool that scans a list of given domains, and returns the status codes for each domain on both port 80 & 443☆18Updated 4 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆36Updated 5 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 7 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- buffer overflow examples☆22Updated 7 years ago
- Automated Google dorking with custom search engines☆27Updated 5 years ago
- ☆17Updated 6 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆25Updated 4 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 4 years ago
- ☆33Updated 5 months ago
- Automation Hacking & Penetration Testing Suite☆10Updated 8 years ago
- SSL/TLS vulnerability research☆10Updated 2 years ago
- Google Hack Database dork automatic tool.☆24Updated 7 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆29Updated 3 years ago
- Serbian/English wordlist for https://github.com/maurosoria/dirsearch☆19Updated 8 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆11Updated 5 years ago
- Auto Web Vulnerability Scanning Framework☆10Updated 9 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Updated 5 years ago
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- SPIZZLE, The Onion Spider.☆13Updated 7 years ago
- Network Assessment Assistance Framework (PenTest Toolkit).☆42Updated 5 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- Remove Offensive and Profane Words from Wordlists☆15Updated last year