☆21Jan 30, 2019Updated 7 years ago
Alternatives and similar repositories for exploitdb-API
Users that are interested in exploitdb-API are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Yara Lua output script for Suricata☆20Apr 7, 2019Updated 7 years ago
- Bulk hostname lookup using shodan☆14Jun 1, 2022Updated 3 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- Scanner for CVE-2023-46805 - Ivanti Connect Secure☆10Jul 23, 2024Updated last year
- Modern Portfolio Website Using Next.js 14☆10Mar 15, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A collection of scripts to explore domains and pick up information.☆13Sep 17, 2018Updated 7 years ago
- Python logging handler for Loki☆18Dec 12, 2025Updated 4 months ago
- Registry for all GrafanaLabs kinds.☆14Feb 26, 2026Updated last month
- 🐍 Classic Snake Game for CLI (Powered by Bootgly CLI)☆19Jul 28, 2023Updated 2 years ago
- This is an arbitrage bot that was built for the Velas EVM compatible chain☆19Oct 27, 2022Updated 3 years ago
- AltSH (alternative shell script) formatter with support for ShellSpec and shpec syntax (experimental)☆16Jun 22, 2024Updated last year
- ☆13Mar 19, 2024Updated 2 years ago
- ☆10Feb 4, 2024Updated 2 years ago
- Fake Update Website ( On Click Automatic Download Windows Payload )☆11Apr 8, 2020Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Adds an IP Address feed (CIDR) into Check Point Objects via a URL☆11May 22, 2020Updated 5 years ago
- ☆13Aug 29, 2021Updated 4 years ago
- Leaked Mirai Source Code for Research/IoC Development Purposes☆16Oct 31, 2016Updated 9 years ago
- ☆21Aug 22, 2022Updated 3 years ago
- Universal Forensic Indexer and Analyzer☆10Jan 8, 2017Updated 9 years ago
- ☆14Aug 3, 2020Updated 5 years ago
- The code implements ransomware-like behavior, encrypting files by changing their extensions to "k3vil." It includes a decryption process …☆22May 23, 2024Updated last year
- Brand New Code Injection for Windows☆13Oct 28, 2016Updated 9 years ago
- Some terrible features you can add to Python☆12Jan 27, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Cfd (Cloudflare detector) is a tool that allows you to check one or more domains to see if they are protected by CloudFlare or not. The c…☆17Mar 30, 2023Updated 3 years ago
- A toy Linux rootkit.☆13May 10, 2013Updated 12 years ago
- ☆12Aug 22, 2017Updated 8 years ago
- CVE-2024-21893 to CVE-2024-21887 Exploit Toolkit☆26Apr 6, 2025Updated last year
- EPSS(Exploit Prediction Scoring System) API client☆20Oct 30, 2025Updated 5 months ago
- LDAP Enumeration Tool☆13Mar 28, 2024Updated 2 years ago
- Export a Grafana dashboard as PDF☆18Dec 15, 2025Updated 4 months ago
- SchemaCrawler plugins for additional databases☆15Updated this week
- ☆14Nov 18, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Growtopia stealer written at C# that steal save.dat, mac address, IP information, etc...☆10Aug 17, 2021Updated 4 years ago
- A CLI tool that generates example data from JSON Typedef schemas☆15Feb 4, 2021Updated 5 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Apr 4, 2022Updated 4 years ago
- ☆13Jul 5, 2023Updated 2 years ago
- CI/CD for SQL databases with SQL projects - Azure SQL and SQL Server☆16Dec 11, 2024Updated last year
- Archive of leaked Equation Group materials☆17Aug 17, 2016Updated 9 years ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆16Aug 4, 2023Updated 2 years ago