Shell-style script to search exploit-db.com exploits.
☆61Sep 7, 2024Updated last year
Alternatives and similar repositories for exploitdb
Users that are interested in exploitdb are comparing it to the libraries listed below
Sorting:
- An unordered collection of various personnal scripts☆16Sep 17, 2010Updated 15 years ago
- Social Engineering Toys☆37Feb 1, 2016Updated 10 years ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 11 years ago
- Code Injector Using Code Caves☆15Jul 12, 2015Updated 10 years ago
- A search tool that searches Offensive Securitys Exploit-db and Shodans Exploit DB using their API.☆40May 6, 2014Updated 11 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- NightWriter is a modern real-time collaborative editing tool secured by end-to-end encryption.☆18Oct 16, 2021Updated 4 years ago
- ☆196Sep 27, 2018Updated 7 years ago
- ESP8266 ROM Bootloader utility☆12Jun 28, 2020Updated 5 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- Download exploits from exploit-db.com☆47Jun 26, 2015Updated 10 years ago
- ☆10Apr 8, 2018Updated 7 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Jun 14, 2017Updated 8 years ago
- WPA/WPA2 Belkin.XXXX, Belkin_XXXXXX, belkin.xxx and belkin.xxxx router default key generator.☆15May 13, 2015Updated 10 years ago
- WinAppDbg helper script to catch API calls☆12Mar 26, 2013Updated 12 years ago
- Search drives for documents containing passwords☆65Jul 11, 2014Updated 11 years ago
- XMPP Man-in-the-Middle, quick & dirty☆41Feb 24, 2014Updated 12 years ago
- everything that does not fit elsewhere☆12Dec 27, 2017Updated 8 years ago
- Linux kernel modules developed by me for learning purposes☆19Jan 16, 2013Updated 13 years ago
- Cyber Attack Management for Metasploit☆13Jun 7, 2014Updated 11 years ago
- ☆128Jun 12, 2015Updated 10 years ago
- macOS/OSX hash dump script taken from Empire framework☆13Oct 19, 2018Updated 7 years ago
- H2HC Community Project to Create Exploit Challenges for Practicing☆20Nov 24, 2012Updated 13 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Apr 16, 2020Updated 5 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Apr 17, 2015Updated 10 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Sep 2, 2013Updated 12 years ago
- perl, non-alphanumeric, php☆10Mar 16, 2017Updated 9 years ago
- A static Internet Explorer Fuzzer.☆50Jun 15, 2017Updated 8 years ago
- Java Untrusted Deserialization Exploits Tools☆67Dec 13, 2015Updated 10 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago
- This is a big smash up of a lot of various tools I have made in the past along with some new ones. It includes a array of tools for helpi…☆84May 9, 2014Updated 11 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- A script made to validate numerous cryptographic-related vulnerabilities such as: Heartbleed, Logjam, CRIME,POODLE, DROWN, Weak Cipher Su…☆19Jul 25, 2016Updated 9 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- Upgrade your netcat shell today!☆58Jul 11, 2017Updated 8 years ago
- 地图实时攻击演示☆29Dec 23, 2014Updated 11 years ago
- A Ruby framework designed to aid in the penetration testing of WordPress systems.☆1,044Nov 24, 2019Updated 6 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆221Nov 29, 2016Updated 9 years ago