djjoa / exploit-searcherLinks
Simultaneously search CVEs and exploits across multiple cybersecurity data sources.
☆13Updated 3 years ago
Alternatives and similar repositories for exploit-searcher
Users that are interested in exploit-searcher are comparing it to the libraries listed below
Sorting:
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- Tools used for Pentesting☆22Updated 2 years ago
- ☆12Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆37Updated last month
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆59Updated 2 years ago
- ☆55Updated 2 years ago
- Hunt SSL Certificates for interesting keywords on major cloud service providers / internet☆39Updated last month
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆34Updated last year
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Updated 9 months ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆50Updated last year
- Enumerate AWS permissions and resources.☆69Updated 2 years ago
- ☆27Updated 2 years ago
- ☆24Updated 6 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 2 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 4 months ago
- Handy scripts and one-liners to make life easier☆37Updated 2 years ago
- Assorted scripts I made for Red Teaming / Pen Testing☆13Updated 11 months ago
- Determine the running software version of a remote F5 BIG-IP management interface.☆66Updated last year
- Herramienta en Bash ideal para extraer la información más relevante de un dominio vía rpcclient.☆18Updated last year
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 3 years ago
- ☆20Updated 3 years ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆27Updated 2 years ago
- A collection of commands, scripts, tips, tricks, and other information compiled during my journey to obtaining the OSCP certification.☆23Updated 4 years ago
- Tool for fetching all the available waybackmachine snapshot urls☆21Updated 7 months ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆41Updated last year
- Analyzing AD domains for security risks related to user accounts☆64Updated 2 years ago
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆24Updated last year