The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb
☆7,860Nov 10, 2022Updated 3 years ago
Alternatives and similar repositories for exploitdb
Users that are interested in exploitdb are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb-bin-sploits☆1,822Nov 10, 2022Updated 3 years ago
- The legacy Exploit Database paper repository - New repo located at https://gitlab.com/exploit-database/exploitdb-papers☆462Nov 10, 2022Updated 3 years ago
- Metasploit Framework☆38,037Updated this week
- windows-kernel-exploits Windows平台提权漏洞集合☆8,651Jun 11, 2021Updated 4 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,193May 11, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Empire is a PowerShell and Python post-exploitation agent.☆7,831Jan 19, 2020Updated 6 years ago
- linux-kernel-exploits Linux平台提权漏洞集合☆5,596Jul 13, 2020Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,967Aug 17, 2020Updated 5 years ago
- A little tool to play with Windows security☆21,486Apr 17, 2026Updated 2 weeks ago
- This is a webshell open source project☆10,722Dec 24, 2024Updated last year
- Web application fuzzer☆6,477Jan 21, 2026Updated 3 months ago
- A swiss army knife for pentesting networks☆9,129Dec 6, 2023Updated 2 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆8,864Dec 4, 2025Updated 4 months ago
- Impacket is a collection of Python classes for working with network protocols.☆15,671Updated this week
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,885Apr 25, 2024Updated 2 years ago
- CTF framework and exploit development library☆13,391Apr 19, 2026Updated last week
- 快速搭建各种漏洞环境(Various vulnerability environment)☆3,788Oct 27, 2020Updated 5 years ago
- ✍️ A curated list of CVE PoCs.☆3,500Jan 4, 2022Updated 4 years ago
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,886Nov 10, 2023Updated 2 years ago
- Exploitation Framework for Embedded Devices☆13,097Mar 2, 2026Updated 2 months ago
- Web path scanner☆14,216Mar 16, 2026Updated last month
- This project has stopped to maintenance, please to https://github.com/knownsec/pocsuite3 project.☆1,821May 27, 2022Updated 3 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆70,522Updated this week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Linux privilege escalation auditing tool☆6,470Mar 20, 2026Updated last month
- Pre-Built Vulnerable Environments Based on Docker-Compose☆20,597Updated this week
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆3,163Mar 6, 2025Updated last year
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,975Mar 22, 2024Updated 2 years ago
- The Browser Exploitation Framework Project☆10,832Apr 24, 2026Updated last week
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,905Sep 6, 2023Updated 2 years ago
- Automated All-in-One OS Command Injection Exploitation Tool☆5,716Apr 23, 2026Updated last week
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,438Oct 30, 2023Updated 2 years ago
- A tool to dump the login password from the current linux user☆4,104Sep 5, 2025Updated 7 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆25,583Apr 23, 2026Updated last week
- Six Degrees of Domain Admin☆10,532Mar 2, 2026Updated 2 months ago
- MS17-010☆2,242Jun 20, 2023Updated 2 years ago
- Attack Surface Management Platform☆9,715Feb 15, 2026Updated 2 months ago
- Miscellaneous exploit code☆1,567Oct 6, 2023Updated 2 years ago
- Linux Exploit Suggester; based on operating system release number☆1,813May 19, 2014Updated 11 years ago
- Automatic SQL injection and database takeover tool☆37,167Apr 24, 2026Updated last week