Shivangx01b / Exploitdb-searchLinks
Exploitdb website search module written in python to ease you task ... No local db for exploitdb is need ...It just uses google dorks and some scrapping to make the exploit searching easy as searcsploit
☆12Updated 5 years ago
Alternatives and similar repositories for Exploitdb-search
Users that are interested in Exploitdb-search are comparing it to the libraries listed below
Sorting:
- A tool that scans a list of given domains, and returns the status codes for each domain on both port 80 & 443☆18Updated 4 years ago
- Checks if a windows machine with the smb service actve is vulnerable to the CVEs of a CSV file passed as argument to the script☆13Updated 2 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- ☆17Updated 6 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 4 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 6 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- ☆13Updated 7 years ago
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- A Simple Web Shell used for Remote Code Execution.☆11Updated 5 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- SSL/TLS vulnerability research☆10Updated 2 years ago
- A tool to speed up Android pentesting by automating the APK acquisition and information gathering☆19Updated 2 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 4 years ago
- Serbian/English wordlist for https://github.com/maurosoria/dirsearch☆19Updated 8 years ago
- random buffer overflows as I get ready to take the oscp in 2097☆12Updated 7 years ago
- Script Recon Bug Bounty☆10Updated 4 years ago
- Automated Google dorking with custom search engines☆27Updated 5 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- SPIZZLE, The Onion Spider.☆13Updated 7 years ago
- Auto Web Vulnerability Scanning Framework☆10Updated 9 years ago
- Bludit <= 3.9.2 - Authentication Bruteforce Mitigation Bypass☆14Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 4 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Updated 11 months ago
- NooB PyThon Matasploit Av Bypasser By Ali khan☆8Updated 4 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Updated 2 years ago
- ☆33Updated 4 months ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago