Effectively search the Exploit-DB
☆15Apr 16, 2020Updated 5 years ago
Alternatives and similar repositories for 2PL017
Users that are interested in 2PL017 are comparing it to the libraries listed below
Sorting:
- nmapcli is a tool written in Python with pre-defined scan templates to automate Nmap scans☆11Sep 10, 2017Updated 8 years ago
- tmp files from tmp notes as tmp-pocs... ;)☆16Jun 3, 2022Updated 3 years ago
- Python Tool for Host Enumeration☆50Mar 24, 2017Updated 8 years ago
- Red Teaming Experiments / Offensive Security / OSCP & Pentesting Cheat Sheets and more☆18Jan 11, 2019Updated 7 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- A collection of one off hacks and simple scripts☆26Mar 21, 2023Updated 3 years ago
- Burp Suite plugin to copy regex matches from selected requests and/or responses to the clipboard.☆34Feb 12, 2022Updated 4 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- Enhanced UI CSS overlay for uBlock Origin☆11Mar 4, 2017Updated 9 years ago
- Customized docker images generation toolkit☆25Oct 14, 2021Updated 4 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆61May 11, 2015Updated 10 years ago
- ☆14Jun 2, 2025Updated 9 months ago
- The LVC-HostsManager allows you to update your hosts file with a downloaded blacklist☆17May 10, 2018Updated 7 years ago
- Cosmetic and tracking filters for uBlock Origin and Nano Adblocker.☆12Aug 11, 2025Updated 7 months ago
- tlsplayback is a set of Proof of Concepts (PoC) showing real-world replay attacks against TLS 1.3 libraries and browsers by exploiting 0-…☆16Aug 11, 2018Updated 7 years ago
- Personal notes used to pass the OSWP exam☆94Aug 10, 2022Updated 3 years ago
- An attempt of a dashboard☆11Jun 3, 2021Updated 4 years ago
- Custom filters and other resources to use with uBlock Origin and uMatrix.☆14Feb 23, 2018Updated 8 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆14May 15, 2019Updated 6 years ago
- KCSEC Rubber Ducky Tookit☆11Jul 12, 2018Updated 7 years ago
- Decrypt encrypted SonicOSX firmware images☆20Feb 24, 2025Updated last year
- This is a gem that provides the ability to create a workspace, import scan data from nexpose, and perform a webscan, a web audit, and per…☆10Dec 13, 2017Updated 8 years ago
- ☆10Aug 4, 2020Updated 5 years ago
- defendA Data Lake. A firehose pipeline to athena providing enrichment and normalization for security events☆17Apr 19, 2023Updated 2 years ago
- Web server for controlling LED diodes with a NodeMCU (ESP8266)☆11Apr 26, 2020Updated 5 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Dec 19, 2023Updated 2 years ago
- Improves vulnerability prioritization by enhancing CVSS scores with exploit intelligence. Combines data from CISA KEV, EPSS, Metasploit, …☆14Updated this week
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Proof of concept about a path traversal vulnerability in Microsoft's Diagcab technology that could lead to remote code execution☆23Jun 16, 2022Updated 3 years ago
- Tools to decrypt Google Chrome, Mozilla Firefox and Microsoft Edge login/password information.☆17Apr 10, 2023Updated 2 years ago
- TorrentFinder.sh is a "simple" bash script that uses wget, grep, etc. to list the top 5 torrents found on each of the 8 sites based on th…☆12Feb 4, 2018Updated 8 years ago
- POC for CVE-2022-47966 affecting multiple ManageEngine products☆127Jan 19, 2023Updated 3 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- <hr> for your terminal; define a thematic change in content☆13Jun 8, 2024Updated last year
- PowerShell version of Fail2Ban☆13Oct 10, 2019Updated 6 years ago
- ☆22Jul 15, 2023Updated 2 years ago
- THIS REPOSITORY IS STALE. Collection of resources for penetration testing, ethical hacking, cybersecurity, organized by user context.☆10Jan 20, 2017Updated 9 years ago
- Insecure Deserialization, PDF and lab☆18Nov 19, 2019Updated 6 years ago
- Filters for blocking trackers for uBlock Origin☆19Nov 9, 2019Updated 6 years ago