andreafioraldi / cve_searchsploitLinks
Search an exploit in the local exploitdb database by its CVE
☆172Updated 2 years ago
Alternatives and similar repositories for cve_searchsploit
Users that are interested in cve_searchsploit are comparing it to the libraries listed below
Sorting:
- Free and open NMAP NSE script to query vulnerabilities via the cve-search.org API.☆250Updated 5 years ago
- Containing Self Made Perl Reproducers / PoC Codes☆195Updated 5 years ago
- Search Exploitable Software on Linux☆231Updated 2 years ago
- Linux post exploitation privilege escalation enumeration☆259Updated 5 years ago
- Reverse Shell Cheat Sheet TooL☆298Updated 5 years ago
- PA Toolkit is a collection of traffic analysis plugins focused on security☆433Updated 5 years ago
- Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566☆258Updated last year
- Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.☆203Updated last year
- Python API wrapper and command-line client for the tools hosted on spyse.com.☆273Updated 5 years ago
- Resources to help get started with IoT Pentesting☆168Updated 6 years ago
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆292Updated 2 years ago
- SSLScrape | A scanning tool for scaping hostnames from SSL certificates.☆333Updated 4 years ago
- File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.☆273Updated 4 years ago
- an asynchronous target enumeration tool☆244Updated 2 years ago
- SQL Injection Payloads for Burp Suite, OWASP Zed Attack Proxy,...☆232Updated 5 years ago
- Burp Suite extension to discover assets from HTTP response.☆229Updated 7 months ago
- ☆217Updated 3 years ago
- Damn Vulnerable eXtensive Training Environment☆106Updated 3 years ago
- Linux Privilege Escalation Tool☆185Updated 6 years ago
- Collection of different exploits☆181Updated 4 years ago
- A wrapper for Nmap to quickly run network scans☆147Updated 4 years ago
- Exploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity☆204Updated 3 years ago
- A lab for playing with NoSQL Injection☆134Updated 5 years ago
- A collection of web pages, vulnerable to command injection flaws.☆179Updated 2 years ago
- Relational database brute force and post exploitation tool for MySQL and MSSQL☆224Updated last year
- Nmap custom probes for better detecting SAP services☆140Updated last year
- SHELLING - a comprehensive OS command injection payload generator☆111Updated 6 years ago
- An SNMPv3 User Enumerator and Attack tool☆254Updated 5 years ago
- A simple framework for sending test payloads for known web CVEs.☆133Updated 4 years ago
- 🏰 A Python script for AWS S3 bucket enumeration.☆144Updated 2 years ago