A search tool that searches Offensive Securitys Exploit-db and Shodans Exploit DB using their API.
☆40May 6, 2014Updated 11 years ago
Alternatives and similar repositories for Python-Exploit-Search-Tool
Users that are interested in Python-Exploit-Search-Tool are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Jul 22, 2012Updated 13 years ago
- A java based google hacking tool that allows to do advanced search on google, also to search in google hacking database and exploit datab…☆23Dec 7, 2016Updated 9 years ago
- Bro is a powerful network analysis framework that is much different from the typical IDS you may know. Official mirror of git.bro.org/br…☆10Aug 16, 2014Updated 11 years ago
- POC Framework☆10Jul 16, 2017Updated 8 years ago
- ☆21May 11, 2013Updated 12 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆24Jul 6, 2015Updated 10 years ago
- ☆21Feb 20, 2014Updated 12 years ago
- ~ ADMIN Panel Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆21Jun 29, 2016Updated 9 years ago
- NTrace -- a function boundary tracing tool for Windows user and kernel mode☆22Nov 1, 2013Updated 12 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- Vulnerability teaching showcase☆13Apr 19, 2016Updated 9 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- EtherAnnotate IDA Pro Plugin - Parse EtherAnnotate trace files and markup IDA disassemblies with runtime values☆13May 4, 2010Updated 15 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Simple php backdoor based on extension☆22Feb 12, 2015Updated 11 years ago
- Build a search engine from nmap XML files☆20Aug 19, 2014Updated 11 years ago
- ☆16Jan 29, 2023Updated 3 years ago
- Shell-style script to search exploit-db.com exploits.☆62Sep 7, 2024Updated last year
- Automated Password Dumper for Web Browsers☆16Mar 23, 2014Updated 12 years ago
- H2HC Community Project to Create Exploit Challenges for Practicing☆20Nov 24, 2012Updated 13 years ago
- A mostly FP implementation of Schorre's "syntax-oriented compiler writing language"☆13Mar 21, 2019Updated 7 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- ☆16Jan 14, 2016Updated 10 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆19Jun 8, 2017Updated 8 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆12Oct 10, 2015Updated 10 years ago
- Este instalador instalará Metasploit en termux solucionando el error de ruby 3.0.0☆12Apr 29, 2021Updated 4 years ago
- Pentest utils☆14Oct 8, 2016Updated 9 years ago
- Unofficial API for 0day.today database | Supported languages: Python and PHP☆16Nov 22, 2019Updated 6 years ago
- FUD Metasploit Android Payload☆11Nov 30, 2015Updated 10 years ago
- Dump LSASS process in Task Manager without triggering Defender.☆18Apr 6, 2023Updated 3 years ago
- Recon scripts for bug hunting☆10Nov 19, 2021Updated 4 years ago
- Firewall bypass script based on shodan search results☆14Jun 5, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- BeEF Remote Control Metasploit Plugin - see README.beef☆13May 11, 2018Updated 7 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- Offline Security Focus Database☆31Dec 24, 2012Updated 13 years ago
- Repo for quick AST transformation nonsense.☆13Nov 23, 2021Updated 4 years ago
- Simplified NAT Slipstream server and client☆22Dec 4, 2020Updated 5 years ago
- This is a webshell open source project☆10Oct 7, 2016Updated 9 years ago
- Machine Learning basics with phishing dataset☆11Apr 19, 2021Updated 4 years ago