A search tool that searches Offensive Securitys Exploit-db and Shodans Exploit DB using their API.
☆40May 6, 2014Updated 11 years ago
Alternatives and similar repositories for Python-Exploit-Search-Tool
Users that are interested in Python-Exploit-Search-Tool are comparing it to the libraries listed below
Sorting:
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Jul 22, 2012Updated 13 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated 11 months ago
- EtherAnnotate IDA Pro Plugin - Parse EtherAnnotate trace files and markup IDA disassemblies with runtime values☆13May 4, 2010Updated 15 years ago
- ☆24Jul 6, 2015Updated 10 years ago
- A java based google hacking tool that allows to do advanced search on google, also to search in google hacking database and exploit datab…☆23Dec 7, 2016Updated 9 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Bro is a powerful network analysis framework that is much different from the typical IDS you may know. Official mirror of git.bro.org/br…☆10Aug 16, 2014Updated 11 years ago
- Vulnerability teaching showcase☆13Apr 19, 2016Updated 9 years ago
- !exploitable Crash Analyzer - MSEC Debugger Extensions☆11Feb 16, 2021Updated 5 years ago
- POC Framework☆10Jul 16, 2017Updated 8 years ago
- Cross-Qt compatibility module for IDAPython.☆13Oct 2, 2019Updated 6 years ago
- Example plug-ins for GammaRay☆15Jun 4, 2018Updated 7 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13May 11, 2018Updated 7 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- LG Root Exploit☆36Jun 26, 2013Updated 12 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆11Oct 10, 2015Updated 10 years ago
- FUD Metasploit Android Payload☆11Nov 30, 2015Updated 10 years ago
- ☆15Jan 14, 2016Updated 10 years ago
- Crappy Win32k syscall fuzzer☆13May 2, 2015Updated 10 years ago
- python packet sniffer☆11Jan 25, 2018Updated 8 years ago
- ☆21May 11, 2013Updated 12 years ago
- Shell-style script to search exploit-db.com exploits.☆61Sep 7, 2024Updated last year
- Create accounts on textnow.com automatically, bypass reCaptcha with 2captcha.com API☆12Nov 11, 2017Updated 8 years ago
- Basic script to rotate through reverse SSH proxies built through EC2, useful for obfuscating (weakly anonymizing) your source. Nice for b…☆13Mar 6, 2015Updated 10 years ago
- Projects For the HackRF One☆14Aug 13, 2014Updated 11 years ago
- Build a search engine from nmap XML files☆20Aug 19, 2014Updated 11 years ago
- A simple Nessus results viewer☆49Aug 30, 2013Updated 12 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- Bypass AntiVirus with Python and Metasploit using shellcode☆11Mar 25, 2016Updated 9 years ago
- enable kmem without rebooting☆23May 6, 2012Updated 13 years ago
- A ptrace based sandbox. (PoC)☆14Jun 3, 2018Updated 7 years ago
- CCTV Camera scanner using the GoAhead webserver exploit☆18May 25, 2025Updated 9 months ago
- Windows x86 Hardware Breakpoint class for Windows >Vista☆23Aug 7, 2016Updated 9 years ago
- Simplified NAT Slipstream server and client☆22Dec 4, 2020Updated 5 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆21Dec 2, 2024Updated last year
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- ☆16Jan 29, 2023Updated 3 years ago
- WeakNet PHP Execution Shell☆31Oct 14, 2015Updated 10 years ago