Search the ExploitDB with a little more control
☆22Jun 4, 2017Updated 8 years ago
Alternatives and similar repositories for searchsploit2
Users that are interested in searchsploit2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Some are on exploit-db, some aren't. Mostly useless.☆12Jun 21, 2017Updated 8 years ago
- A scripted library of hacking techniques.☆18Jul 18, 2018Updated 7 years ago
- Automatically scans for malicious proxies.☆31Mar 7, 2015Updated 11 years ago
- My pentest cheat sheet☆16Apr 27, 2017Updated 8 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- just a python script for cve-2017-12615☆11Oct 1, 2017Updated 8 years ago
- A tool to speed up Android pentesting by automating the APK acquisition and information gathering☆18Jul 6, 2022Updated 3 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- script to brute force ssh or ftp passwords☆12Jul 22, 2016Updated 9 years ago
- Directory Fuzzer for Pentesting and Host Recon☆29Nov 10, 2018Updated 7 years ago
- 超精简的POC扫描框架☆10Aug 5, 2019Updated 6 years ago
- Monitor Certificate Transparency Logs For Phishing Domains☆23Nov 19, 2018Updated 7 years ago
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Aug 6, 2016Updated 9 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆19Nov 25, 2016Updated 9 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆13Oct 5, 2011Updated 14 years ago
- w8ay专属扫描器☆11Feb 9, 2017Updated 9 years ago
- Metasploit_postgresql_database_connection_fix☆12Jan 30, 2019Updated 7 years ago
- 记录一些python写的好东西(不一定都是python的)☆10Nov 17, 2020Updated 5 years ago
- Little directed graph with backlink support.☆11Nov 19, 2015Updated 10 years ago
- 常规漏洞+逻辑漏洞+配置漏洞+漏洞分析☆10Nov 29, 2019Updated 6 years ago
- st2-046-poc CVE-2017-5638☆21Aug 17, 2018Updated 7 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- A script to reverse-engineer anti-virus signatures☆32Mar 20, 2013Updated 13 years ago
- Collect and filter location information from social network services.☆11Jun 14, 2020Updated 5 years ago
- Two applications for the M5Stack ATOM Echo running MicroPython.☆14Jun 2, 2020Updated 5 years ago
- ☆26Sep 2, 2016Updated 9 years ago
- example.on('end', mustCall(() => {})); Check the callback function is called.☆10Nov 20, 2022Updated 3 years ago
- A simple, lightweight Remote Access Tool written in Python☆16Apr 11, 2019Updated 6 years ago
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago
- python packet sniffer☆11Jan 25, 2018Updated 8 years ago
- Quantum Insert/FoxAcid case study☆16May 18, 2017Updated 8 years ago
- simple build/restart service for docker containers when the filesystem changes☆11Nov 17, 2016Updated 9 years ago
- A compendium of threat modeling and security testing resources for LLMs and GenAI agents☆18Oct 16, 2024Updated last year
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆12Feb 16, 2021Updated 5 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Feb 20, 2015Updated 11 years ago
- web scanner☆23Jan 29, 2019Updated 7 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Jun 10, 2014Updated 11 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- ❄️ Research project for SubFinder core API V2☆34Dec 30, 2018Updated 7 years ago