Shell-style script to search exploit-db.com exploits.
☆62Sep 7, 2024Updated last year
Alternatives and similar repositories for exploitdb
Users that are interested in exploitdb are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An unordered collection of various personnal scripts☆16Sep 17, 2010Updated 15 years ago
- Social Engineering Toys☆38Feb 1, 2016Updated 10 years ago
- p0f Python Wrapper☆17Sep 29, 2013Updated 12 years ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 12 years ago
- Code Injector Using Code Caves☆15Jul 12, 2015Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A search tool that searches Offensive Securitys Exploit-db and Shodans Exploit DB using their API.☆40May 6, 2014Updated 11 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- ☆16Jun 28, 2025Updated 9 months ago
- ☆197Sep 27, 2018Updated 7 years ago
- ESP8266 ROM Bootloader utility☆12Jun 28, 2020Updated 5 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- Download exploits from exploit-db.com☆47Jun 26, 2015Updated 10 years ago
- ☆10Apr 8, 2018Updated 8 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Jun 14, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Search drives for documents containing passwords☆65Jul 11, 2014Updated 11 years ago
- XMPP Man-in-the-Middle, quick & dirty☆41Feb 24, 2014Updated 12 years ago
- Linux kernel modules developed by me for learning purposes☆19Jan 16, 2013Updated 13 years ago
- ☆21Mar 24, 2015Updated 11 years ago
- ☆128Jun 12, 2015Updated 10 years ago
- macOS/OSX hash dump script taken from Empire framework☆13Oct 19, 2018Updated 7 years ago
- A website outlining my bounty hunt game.☆11Oct 13, 2019Updated 6 years ago
- H2HC Community Project to Create Exploit Challenges for Practicing☆20Nov 24, 2012Updated 13 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A tool to download malwares☆16May 22, 2023Updated 2 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Apr 16, 2020Updated 5 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Apr 17, 2015Updated 10 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Sep 2, 2013Updated 12 years ago
- perl, non-alphanumeric, php☆10Mar 16, 2017Updated 9 years ago
- A static Internet Explorer Fuzzer.☆50Jun 15, 2017Updated 8 years ago
- Java Untrusted Deserialization Exploits Tools☆67Dec 13, 2015Updated 10 years ago
- This is a big smash up of a lot of various tools I have made in the past along with some new ones. It includes a array of tools for helpi…☆83May 9, 2014Updated 11 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆16Jul 6, 2014Updated 11 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A script made to validate numerous cryptographic-related vulnerabilities such as: Heartbleed, Logjam, CRIME,POODLE, DROWN, Weak Cipher Su…☆19Jul 25, 2016Updated 9 years ago
- Website for Caption app.☆14Jan 2, 2019Updated 7 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- 地图实时攻击演示☆29Dec 23, 2014Updated 11 years ago
- A Ruby framework designed to aid in the penetration testing of WordPress systems.☆1,044Nov 24, 2019Updated 6 years ago
- cross-platform sqlmap GUI aimed to mobile devices☆49Jun 27, 2016Updated 9 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆221Nov 29, 2016Updated 9 years ago