Shell-style script to search exploit-db.com exploits.
☆62Apr 12, 2026Updated 2 weeks ago
Alternatives and similar repositories for exploitdb
Users that are interested in exploitdb are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Social Engineering Toys☆38Feb 1, 2016Updated 10 years ago
- p0f Python Wrapper☆17Sep 29, 2013Updated 12 years ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 12 years ago
- Code Injector Using Code Caves☆15Jul 12, 2015Updated 10 years ago
- A search tool that searches Offensive Securitys Exploit-db and Shodans Exploit DB using their API.☆40May 6, 2014Updated 11 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- NightWriter is a modern real-time collaborative editing tool secured by end-to-end encryption.☆18Oct 16, 2021Updated 4 years ago
- ☆197Sep 27, 2018Updated 7 years ago
- ESP8266 ROM Bootloader utility☆12Jun 28, 2020Updated 5 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- Download exploits from exploit-db.com☆47Jun 26, 2015Updated 10 years ago
- ☆10Apr 8, 2018Updated 8 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Jun 14, 2017Updated 8 years ago
- WPA/WPA2 Belkin.XXXX, Belkin_XXXXXX, belkin.xxx and belkin.xxxx router default key generator.☆15May 13, 2015Updated 10 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Search drives for documents containing passwords☆65Jul 11, 2014Updated 11 years ago
- WinAppDbg helper script to catch API calls☆12Mar 26, 2013Updated 13 years ago
- XMPP Man-in-the-Middle, quick & dirty☆41Feb 24, 2014Updated 12 years ago
- Linux kernel modules developed by me for learning purposes☆19Jan 16, 2013Updated 13 years ago
- ☆21Mar 24, 2015Updated 11 years ago
- Cyber Attack Management for Metasploit☆13Jun 7, 2014Updated 11 years ago
- ☆128Jun 12, 2015Updated 10 years ago
- macOS/OSX hash dump script taken from Empire framework☆13Oct 19, 2018Updated 7 years ago
- A website outlining my bounty hunt game.☆11Oct 13, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- H2HC Community Project to Create Exploit Challenges for Practicing☆20Nov 24, 2012Updated 13 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- A tool to download malwares☆16May 22, 2023Updated 2 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Apr 16, 2020Updated 6 years ago
- RDP POC☆19Jun 1, 2019Updated 6 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Sep 2, 2013Updated 12 years ago
- perl, non-alphanumeric, php☆10Mar 16, 2017Updated 9 years ago
- Java Untrusted Deserialization Exploits Tools☆67Dec 13, 2015Updated 10 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- This is a big smash up of a lot of various tools I have made in the past along with some new ones. It includes a array of tools for helpi…☆83May 9, 2014Updated 11 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆16Jul 6, 2014Updated 11 years ago
- A script made to validate numerous cryptographic-related vulnerabilities such as: Heartbleed, Logjam, CRIME,POODLE, DROWN, Weak Cipher Su…☆19Jul 25, 2016Updated 9 years ago
- Website for Caption app.☆14Apr 14, 2026Updated 2 weeks ago
- ☆12May 22, 2018Updated 7 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆28Aug 9, 2018Updated 7 years ago