A search tool that searches Offensive Securitys Exploit-db and Shodans Exploit DB using their API.
☆40May 6, 2014Updated 12 years ago
Alternatives and similar repositories for Python-Exploit-Search-Tool
Users that are interested in Python-Exploit-Search-Tool are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Jul 22, 2012Updated 13 years ago
- A java based google hacking tool that allows to do advanced search on google, also to search in google hacking database and exploit datab…☆23Dec 7, 2016Updated 9 years ago
- POC Framework☆10Jul 16, 2017Updated 8 years ago
- ☆21May 11, 2013Updated 13 years ago
- ☆24Jul 6, 2015Updated 10 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- sebug.net上面的镜像☆63Apr 8, 2014Updated 12 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- Cross-Qt compatibility module for IDAPython.☆13Oct 2, 2019Updated 6 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- Alina POS Source Code + Rootkit☆23Nov 3, 2015Updated 10 years ago
- ☆10Aug 9, 2024Updated last year
- Vulnerability teaching showcase☆13Apr 19, 2016Updated 10 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- EtherAnnotate IDA Pro Plugin - Parse EtherAnnotate trace files and markup IDA disassemblies with runtime values☆13May 4, 2010Updated 16 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Simple php backdoor based on extension☆22Feb 12, 2015Updated 11 years ago
- Build a search engine from nmap XML files☆20Aug 19, 2014Updated 11 years ago
- ☆16Jan 29, 2023Updated 3 years ago
- Shell-style script to search exploit-db.com exploits.☆62Apr 12, 2026Updated last month
- Automated Password Dumper for Web Browsers☆16Mar 23, 2014Updated 12 years ago
- H2HC Community Project to Create Exploit Challenges for Practicing☆20Nov 24, 2012Updated 13 years ago
- ابزار ساده برای هک اکانت های بلاگفاBlogfa.com [password] cracker python tool { this tool for crack passwords from blogfa.com } ابزار پای…☆11Mar 22, 2023Updated 3 years ago
- A mostly FP implementation of Schorre's "syntax-oriented compiler writing language"☆13Mar 21, 2019Updated 7 years ago
- ☆16Jan 14, 2016Updated 10 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆12Oct 10, 2015Updated 10 years ago
- Este instalador instalará Metasploit en termux solucionando el error de ruby 3.0.0