Search the ExploitDB with a little more control
☆22Jun 4, 2017Updated 8 years ago
Alternatives and similar repositories for searchsploit2
Users that are interested in searchsploit2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Some are on exploit-db, some aren't. Mostly useless.☆12Jun 21, 2017Updated 8 years ago
- A scripted library of hacking techniques.☆18Jul 18, 2018Updated 7 years ago
- ☆14Jun 19, 2018Updated 7 years ago
- Automatically scans for malicious proxies.☆30Mar 7, 2015Updated 11 years ago
- My pentest cheat sheet☆16Apr 27, 2017Updated 9 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- PGT allows you to generate pcaps using python without touching the network in any way. It is dependent upon scapy.☆29Jan 3, 2022Updated 4 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- just a python script for cve-2017-12615☆11Oct 1, 2017Updated 8 years ago
- A tool to speed up Android pentesting by automating the APK acquisition and information gathering☆18Jul 6, 2022Updated 3 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- Exploiting cameras with a very distinctive HTTP Server header of "JAWS/1.0".☆10Jan 11, 2023Updated 3 years ago
- script to brute force ssh or ftp passwords☆12Jul 22, 2016Updated 9 years ago
- Burp Suite Extension useful to inspect UPnP security☆16Nov 9, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Directory Fuzzer for Pentesting and Host Recon☆29Nov 10, 2018Updated 7 years ago
- 超精简的POC扫描框架☆10Aug 5, 2019Updated 6 years ago
- Monitor Certificate Transparency Logs For Phishing Domains☆23Nov 19, 2018Updated 7 years ago
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Aug 6, 2016Updated 9 years ago
- ☆34Jan 1, 2019Updated 7 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆19Nov 25, 2016Updated 9 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆13Oct 5, 2011Updated 14 years ago
- Metasploit_postgresql_database_connection_fix☆12Jan 30, 2019Updated 7 years ago
- w8ay专属扫描器☆11Feb 9, 2017Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Win32 Python code for tracing malware activities on infected hosts☆26Jul 4, 2016Updated 9 years ago
- Little directed graph with backlink support.☆11Nov 19, 2015Updated 10 years ago
- st2-046-poc CVE-2017-5638☆21Aug 17, 2018Updated 7 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 11 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- Automatically perform advanced NTLM hash relay attacks☆15Nov 4, 2022Updated 3 years ago
- Collect and filter location information from social network services.☆11Jun 14, 2020Updated 5 years ago
- ☆24Jan 24, 2025Updated last year
- ☆26Sep 2, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- List (or plunder) private repos/gists to which a token has access, including those of other users☆10Jan 29, 2022Updated 4 years ago
- example.on('end', mustCall(() => {})); Check the callback function is called.☆11Nov 20, 2022Updated 3 years ago
- A simple, lightweight Remote Access Tool written in Python☆16Apr 11, 2019Updated 7 years ago
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 9 years ago
- python packet sniffer☆11Jan 25, 2018Updated 8 years ago
- Quantum Insert/FoxAcid case study☆16May 18, 2017Updated 8 years ago
- simple build/restart service for docker containers when the filesystem changes☆11Nov 17, 2016Updated 9 years ago