mdeous / exploitdb
Shell-style script to search exploit-db.com exploits.
☆59Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for exploitdb
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated 6 months ago
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆77Updated 7 years ago
- ssh session type for metasploit☆97Updated last year
- A few simple scripts and templates I have used during various phishing engagements.☆60Updated 9 years ago
- unix wildcard attacks☆132Updated 6 years ago
- Automatically performs the SMB relay attack☆71Updated 8 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆43Updated 5 years ago
- Veil-Ordnance is a tool designed to quickly generate MSF stager shellcode☆73Updated 9 years ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆79Updated 6 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆71Updated 8 years ago
- Inject beef hooks into HTTP traffic and track hooked systems from cmdline☆120Updated 9 years ago
- Yet another AV evasion tool☆119Updated 2 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 5 years ago
- Automated HaveIbeenPwned lookups using theharvester results☆49Updated 6 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆67Updated 7 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆29Updated 7 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆86Updated 6 years ago
- ☆47Updated 9 years ago
- Tools for harvesting email addresses for phishing attacks |☆84Updated 9 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49Updated 7 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Updated 7 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆52Updated 4 years ago
- Miscellaneous tools and patches that I have written/hacked/forked over the years☆61Updated 12 years ago
- Hacking challenges☆33Updated 7 years ago
- Attack Knowledge Base☆100Updated 7 years ago