kylekirkby / Python-Exploit-Search-ToolLinks
A search tool that searches Offensive Securitys Exploit-db and Shodans Exploit DB using their API.
☆40Updated 11 years ago
Alternatives and similar repositories for Python-Exploit-Search-Tool
Users that are interested in Python-Exploit-Search-Tool are comparing it to the libraries listed below
Sorting:
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆56Updated 6 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- Password cracking utility☆53Updated 4 years ago
- DNS Sub-domain brute forcer, in Python + gevent☆50Updated 8 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- A web spider for shodan.io without using the Developer API.☆31Updated 7 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Updated 4 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 9 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Updated 9 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- Post-Exploitation Framework☆78Updated 8 years ago
- Mutation Of Vıruses☆49Updated 9 years ago
- Python backdoor that uses http post/get requests to communicate☆40Updated 8 years ago
- [discontinued] Mass exploiter of CVE 2015-8562 for Joomla! CMS☆24Updated 7 years ago
- Simple Webshell Scanner☆50Updated 10 years ago
- ssh public host key scanner using shodan☆118Updated 6 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆78Updated 8 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 8 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- Crawl Google and Bing to find emails, subdomains and URLs associated to a target domain☆50Updated 4 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆29Updated 8 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Updated 9 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆47Updated 8 years ago
- Tools for harvesting email addresses for phishing attacks |☆85Updated 9 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆59Updated 2 years ago
- shadowbroker SMB exploit scanner. Scans for ETERNALSYNERGY ETERNALBLUE ETERNALROMANCE ETHERNALCHAMPION☆37Updated 8 years ago