djjoa / exploit-searcher
Simultaneously search CVEs and exploits across multiple cybersecurity data sources.
☆13Updated 3 years ago
Alternatives and similar repositories for exploit-searcher:
Users that are interested in exploit-searcher are comparing it to the libraries listed below
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 3 years ago
- ☆12Updated 3 years ago
- ☆24Updated 6 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆59Updated 2 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- ☆34Updated last year
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Updated 8 months ago
- Tools used for Pentesting☆22Updated 2 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- ☆27Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- Template used for my OSCP exam.☆28Updated 2 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated last year
- Enumerate AWS permissions and resources.☆68Updated 2 years ago
- Hunt SSL Certificates for interesting keywords on major cloud service providers / internet☆39Updated 3 weeks ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- A collection of commands, scripts, tips, tricks, and other information compiled during my journey to obtaining the OSCP certification.☆23Updated 4 years ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆49Updated last year
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆122Updated 2 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆43Updated 2 years ago
- Assorted scripts I made for Red Teaming / Pen Testing☆13Updated 10 months ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆12Updated 4 years ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆27Updated 2 years ago
- Fast Path Traversal exploitation tool☆21Updated last year
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆37Updated last week
- ☆55Updated 2 years ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- DNS resolution tracing tool☆34Updated 3 years ago
- Manage attack surface data on Elasticsearch☆22Updated last year