andreafioraldi / cve_searchsploitLinks
Search an exploit in the local exploitdb database by its CVE
☆172Updated 3 years ago
Alternatives and similar repositories for cve_searchsploit
Users that are interested in cve_searchsploit are comparing it to the libraries listed below
Sorting:
- Free and open NMAP NSE script to query vulnerabilities via the cve-search.org API.☆247Updated 6 years ago
- Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.☆206Updated last year
- Search Exploitable Software on Linux☆231Updated 2 years ago
- Containing Self Made Perl Reproducers / PoC Codes☆198Updated 5 years ago
- Reverse Shell Cheat Sheet TooL☆298Updated 5 years ago
- Resources to help get started with IoT Pentesting☆170Updated 7 years ago
- Burp Suite extension to discover assets from HTTP response.☆228Updated 11 months ago
- File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.☆272Updated 4 years ago
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆295Updated 2 years ago
- SHELLING - a comprehensive OS command injection payload generator☆110Updated 6 years ago
- SQL Injection Payloads for Burp Suite, OWASP Zed Attack Proxy,...☆238Updated 6 years ago
- Simple python script to extract unsafe functions from php projects☆196Updated 7 years ago
- Linux post exploitation privilege escalation enumeration☆257Updated 5 years ago
- A lab for playing with NoSQL Injection☆134Updated 5 years ago
- an asynchronous target enumeration tool☆245Updated 3 years ago
- A series of python scripts for generating weird character combinations for bypassing web application firewalls (WAF) and XSS blockers☆279Updated 7 years ago
- Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566☆263Updated 2 years ago
- Linux Privilege Escalation Tool☆185Updated 6 years ago
- Bypassing-Web-Application-Firewalls-And-XSS-Filters A series of python scripts for generating weird character combinations and lists for…☆145Updated 5 years ago
- ☆218Updated 3 years ago
- Powerful Visual Subdomain Enumeration at the Click of a Mouse☆137Updated 6 years ago
- A wrapper for Nmap to quickly run network scans☆147Updated 5 years ago
- A collection of web pages, vulnerable to command injection flaws.☆180Updated 2 years ago
- useful pentest note☆68Updated last month
- Exploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity☆203Updated 4 years ago
- Hearbleed exploit to retrieve sensitive information CVE-2014-0160☆84Updated 4 years ago
- Nmap custom probes for better detecting SAP services☆142Updated last year
- Pentest/BugBounty progress control with scanning modules☆282Updated 5 years ago
- Collection of different exploits☆183Updated 5 years ago
- 🏰 A Python script for AWS S3 bucket enumeration.☆145Updated 3 years ago