A search tool that searches Offensive Securitys Exploit-db and Shodans Exploit DB using their API.
☆40May 6, 2014Updated 11 years ago
Alternatives and similar repositories for Python-Exploit-Search-Tool
Users that are interested in Python-Exploit-Search-Tool are comparing it to the libraries listed below
Sorting:
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Jul 22, 2012Updated 13 years ago
- A java based google hacking tool that allows to do advanced search on google, also to search in google hacking database and exploit datab…☆23Dec 7, 2016Updated 9 years ago
- Bro is a powerful network analysis framework that is much different from the typical IDS you may know. Official mirror of git.bro.org/br…☆10Aug 16, 2014Updated 11 years ago
- POC Framework☆10Jul 16, 2017Updated 8 years ago
- ☆21May 11, 2013Updated 12 years ago
- ☆24Jul 6, 2015Updated 10 years ago
- sebug.net上面的镜像☆63Apr 8, 2014Updated 11 years ago
- NTrace -- a function boundary tracing tool for Windows user and kernel mode☆22Nov 1, 2013Updated 12 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- Cross-Qt compatibility module for IDAPython.☆13Oct 2, 2019Updated 6 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- Alina POS Source Code + Rootkit☆23Nov 3, 2015Updated 10 years ago
- ☆10Aug 9, 2024Updated last year
- Vulnerability teaching showcase☆13Apr 19, 2016Updated 9 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- EtherAnnotate IDA Pro Plugin - Parse EtherAnnotate trace files and markup IDA disassemblies with runtime values☆13May 4, 2010Updated 15 years ago
- Simple php backdoor based on extension☆22Feb 12, 2015Updated 11 years ago
- Build a search engine from nmap XML files☆20Aug 19, 2014Updated 11 years ago
- Shell-style script to search exploit-db.com exploits.☆61Sep 7, 2024Updated last year
- Automated Password Dumper for Web Browsers☆16Mar 23, 2014Updated 11 years ago
- H2HC Community Project to Create Exploit Challenges for Practicing☆20Nov 24, 2012Updated 13 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- ☆16Jan 14, 2016Updated 10 years ago
- ☆19Jun 8, 2017Updated 8 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆12Oct 10, 2015Updated 10 years ago
- Este instalador instalará Metasploit en termux solucionando el error de ruby 3.0.0☆12Apr 29, 2021Updated 4 years ago
- FUD Metasploit Android Payload☆11Nov 30, 2015Updated 10 years ago
- Dump LSASS process in Task Manager without triggering Defender.☆18Apr 6, 2023Updated 2 years ago
- Firewall bypass script based on shodan search results☆14Jun 5, 2019Updated 6 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13May 11, 2018Updated 7 years ago
- Create accounts on textnow.com automatically, bypass reCaptcha with 2captcha.com API☆12Nov 11, 2017Updated 8 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- Offline Security Focus Database☆31Dec 24, 2012Updated 13 years ago
- Simplified NAT Slipstream server and client☆22Dec 4, 2020Updated 5 years ago
- This is a webshell open source project☆10Oct 7, 2016Updated 9 years ago
- Machine Learning basics with phishing dataset☆10Apr 19, 2021Updated 4 years ago
- Use NtSetInformationThread(ThreadBreakOnTermination) for anti-debugging☆15Sep 21, 2019Updated 6 years ago
- A framework used for Vulnerability scanning☆105Apr 22, 2015Updated 10 years ago
- Different utility scripts for pentesting and hacking.☆45Nov 10, 2017Updated 8 years ago