Shivangx01b / Exploitdb-search
Exploitdb website search module written in python to ease you task ... No local db for exploitdb is need ...It just uses google dorks and some scrapping to make the exploit searching easy as searcsploit
☆12Updated 5 years ago
Alternatives and similar repositories for Exploitdb-search:
Users that are interested in Exploitdb-search are comparing it to the libraries listed below
- A tool that scans a list of given domains, and returns the status codes for each domain on both port 80 & 443☆18Updated 4 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- A tool to speed up Android pentesting by automating the APK acquisition and information gathering☆19Updated 2 years ago
- ☆17Updated 6 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 3 years ago
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- random buffer overflows as I get ready to take the oscp in 2097☆12Updated 7 years ago
- NooB PyThon Matasploit Av Bypasser By Ali khan☆8Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- ☆34Updated 2 months ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 6 years ago
- Tool to automatically email results from your Python scripts to your inbox as text or as a file attachment, storing the sender email acco…☆7Updated 5 years ago
- A Simple Web Shell used for Remote Code Execution.☆11Updated 5 years ago
- Auto Web Vulnerability Scanning Framework☆10Updated 9 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- buffer overflow examples☆22Updated 7 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 4 years ago
- Automated Google dorking with custom search engines☆27Updated 4 years ago
- SPIZZLE, The Onion Spider.☆13Updated 7 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆14Updated 8 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- ☆13Updated 7 years ago
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆16Updated 3 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆11Updated 4 years ago
- :e-mail: Enumerate usernames through SMTP service☆18Updated 5 years ago
- Serbian/English wordlist for https://github.com/maurosoria/dirsearch☆19Updated 8 years ago
- Automation Hacking & Penetration Testing Suite☆10Updated 8 years ago