Search an exploit in the local exploitdb database by its CVE
☆171Nov 16, 2022Updated 3 years ago
Alternatives and similar repositories for cve_searchsploit
Users that are interested in cve_searchsploit are comparing it to the libraries listed below
Sorting:
- AFL++(2.63c/2.65c) + aflsmart(5ad7ea3)☆11Oct 20, 2020Updated 5 years ago
- Search the ExploitDB with a little more control☆22Jun 4, 2017Updated 8 years ago
- Docker container of SANS Investigative Forensic Toolkit (SIFT) Workstation Version 3☆11Oct 9, 2016Updated 9 years ago
- This is an example library to show how to fuzz with AFL++ only the code modified by the last commit.☆17Mar 2, 2020Updated 6 years ago
- Automated compromise detection of the world's most popular packages☆17Sep 25, 2023Updated 2 years ago
- HTTPFuzzer is a simple python script to perform multiple fuzzing techniques for HTTP protocol☆13Aug 24, 2018Updated 7 years ago
- cve-search - a tool to perform local searches for known vulnerabilities☆2,595Feb 20, 2026Updated last week
- Symbolic Execution of Android Framework☆15Jun 25, 2017Updated 8 years ago
- Burp Suite extension for Radamsa-powered fuzzing with Intruder☆20Mar 26, 2022Updated 3 years ago
- A binary-only coverage-guided fuzzer based on AFL and e9patch☆18Oct 13, 2020Updated 5 years ago
- A number of scripts POC's and problems solved as pentests move along.☆44Jun 6, 2024Updated last year
- Finding potential software vulnerabilities from git commit messages☆419Oct 7, 2023Updated 2 years ago
- web based nmap scan collection and search☆19May 13, 2021Updated 4 years ago
- Backdoor, keylogger, mac changer, mitm, netscan, sniffer☆15Aug 15, 2024Updated last year
- ☆34Nov 11, 2021Updated 4 years ago
- Working exploit code for CVE-2019-17625☆19Mar 12, 2020Updated 5 years ago
- A framework to fuzz Word Quick Fields☆20Jul 15, 2018Updated 7 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- Some VxWorks fuzzing examples using Cisco-Kitty and WDBDbg framework☆19Mar 13, 2016Updated 9 years ago
- Python wrapper for the API of cve-search☆126Dec 5, 2023Updated 2 years ago
- Directory transversal to remote code execution☆70Oct 15, 2019Updated 6 years ago
- A simple, quick, and dirty websocket shell for PowerShell.☆20Jun 5, 2017Updated 8 years ago
- ☆16Mar 23, 2018Updated 7 years ago
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Head…☆20Mar 29, 2020Updated 5 years ago
- Read only mirror - No pull requests☆20May 7, 2021Updated 4 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21May 1, 2017Updated 8 years ago
- ☆19Dec 9, 2022Updated 3 years ago
- An Exploit framework for Web Vulnerabilities written in Python☆168Aug 1, 2020Updated 5 years ago
- Use angr in the IDA Pro debugger generating a state from the current debug session☆282Jul 22, 2020Updated 5 years ago
- the Network Protocol Fuzzer that we will want to use.☆793Jan 29, 2024Updated 2 years ago
- Python tool for exploiting CVE-2021-35616☆11Dec 3, 2021Updated 4 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- COVA - A static analysis tool to compute path conditions☆40Updated this week
- ✍️ A curated list of CVE PoCs.☆3,481Jan 4, 2022Updated 4 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Jun 19, 2024Updated last year
- Vulnerability Information Aggregator for CVEs☆124Jun 13, 2019Updated 6 years ago
- TheDorkbox Comprehensive collection of Google Dorks & OSINT techniques to find Confidential Data☆30Dec 27, 2019Updated 6 years ago
- ☆299Nov 9, 2020Updated 5 years ago