djjoa / exploit-searcher
Simultaneously search CVEs and exploits across multiple cybersecurity data sources.
☆13Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for exploit-searcher
- ☆47Updated 2 years ago
- ☆27Updated last year
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆57Updated last year
- User enumeration and password spraying tool for testing Azure AD☆68Updated 2 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 2 years ago
- A "Spring4Shell" vulnerability scanner.☆50Updated 2 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- Network penetration testing toolset wrapper☆80Updated 2 years ago
- DNS resolution tracing tool☆34Updated 3 years ago
- ☆52Updated 6 months ago
- Simple chrome extension for full name extraction and conversion to emails/usernames. Utilizes the 'people' tab of the target company on L…☆23Updated last year
- ☆23Updated 5 years ago
- A curated list wordlists for bruteforcing and fuzzing☆79Updated last year
- Tools used for Pentesting☆22Updated last year
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆31Updated 2 years ago
- Next generation fireprox AWS API endpoint creation utility.☆43Updated last year
- Template used for my OSCP exam.☆26Updated 2 years ago
- Hunt SSL Certificates for interesting keywords on major cloud service providers / internet☆33Updated 10 months ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆21Updated 2 months ago
- a map for the azure oriented pentests☆65Updated last year
- ☆68Updated 6 months ago
- ☆64Updated last year
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆117Updated 2 years ago
- Mind Maps for penetration testing☆17Updated 3 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated last year
- ☆18Updated last year
- Find the remote website version based on a git repository☆124Updated 3 years ago
- ☆12Updated 2 years ago
- Analyzing AD domains for security risks related to user accounts☆63Updated 2 years ago