Shell-style script to search exploit-db.com exploits.
☆61Sep 7, 2024Updated last year
Alternatives and similar repositories for exploitdb
Users that are interested in exploitdb are comparing it to the libraries listed below
Sorting:
- Code Injector Using Code Caves☆15Jul 12, 2015Updated 10 years ago
- ☆16Jun 28, 2025Updated 7 months ago
- Social Engineering Toys☆37Feb 1, 2016Updated 10 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- A search tool that searches Offensive Securitys Exploit-db and Shodans Exploit DB using their API.☆40May 6, 2014Updated 11 years ago
- A website outlining my bounty hunt game.☆11Oct 13, 2019Updated 6 years ago
- ESP8266 ROM Bootloader utility☆12Jun 28, 2020Updated 5 years ago
- p0f Python Wrapper☆17Sep 29, 2013Updated 12 years ago
- WinAppDbg helper script to catch API calls☆12Mar 26, 2013Updated 12 years ago
- [Deprecated] Painless code injection☆52Oct 8, 2014Updated 11 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- Download exploits from exploit-db.com☆47Jun 26, 2015Updated 10 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- Misc Python tools or PoCs. Mainly focused in helping RE, fuzzing☆20Aug 31, 2012Updated 13 years ago
- A tool to download malwares☆16May 22, 2023Updated 2 years ago
- FUD Metasploit Android Payload☆11Nov 30, 2015Updated 10 years ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 11 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- Website for Caption app.☆14Jan 2, 2019Updated 7 years ago
- enable kmem without rebooting☆23May 6, 2012Updated 13 years ago
- Basic file metadata gathering script☆21Apr 16, 2025Updated 10 months ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- Wireless discovery and exploitation framework written in Python☆18Dec 17, 2010Updated 15 years ago
- ☆196Sep 27, 2018Updated 7 years ago
- Search drives for documents containing passwords☆65Jul 11, 2014Updated 11 years ago
- tiny wrapper around Windows Management Instrumentation API☆13Nov 9, 2018Updated 7 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Jan 18, 2016Updated 10 years ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- _Working_ examples from Grayhat Python☆14Apr 28, 2015Updated 10 years ago
- HitCon 2014 : IE 11 0day & Windows 8.1 Exploit☆25Aug 25, 2014Updated 11 years ago
- XSS payload designed to steal LastPass users' credentials☆16Apr 25, 2014Updated 11 years ago
- CVE-2014-0816☆25Oct 5, 2016Updated 9 years ago
- NightWriter is a modern real-time collaborative editing tool secured by end-to-end encryption.☆18Oct 16, 2021Updated 4 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Sep 2, 2013Updated 12 years ago
- Windows 8.1 + IE 11 Exploit☆18Jul 26, 2016Updated 9 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Sep 24, 2012Updated 13 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆221Nov 29, 2016Updated 9 years ago
- A PowerShell binding for the Unicorn Engine☆17Dec 27, 2015Updated 10 years ago