Exploits R&D
☆21May 25, 2024Updated last year
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- The script specializes in collecting information about sites, protocols and servers, facilitating work on the Metasploit project and repa…☆13Oct 31, 2018Updated 7 years ago
- masscan -> result -> IP:PORT☆24May 21, 2024Updated last year
- A security tool designed to perform thorough scans on a target using OpenVAS, Zap, and Nexpose. It seamlessly consolidates and integrates…☆46Feb 11, 2026Updated 3 weeks ago
- Recon Dog is an all in one tool for all your basic information gathering needs.☆11Mar 2, 2018Updated 8 years ago
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- Find the zone of the mobile number using the suffix code☆14Aug 17, 2022Updated 3 years ago
- Scrape emails, phone numbers and social media accounts from a website. You can use the found information to gather more information or ju…☆15Dec 6, 2021Updated 4 years ago
- Python's dependable dependency injection container for managing lifecycles and registrations.☆14May 16, 2024Updated last year
- For accessing info of both public and private instagram accounts☆17Aug 29, 2022Updated 3 years ago
- ☆11Aug 31, 2019Updated 6 years ago
- Boilerplate for deploying glue python shell jobs through shell script. For developers, it will be useful as script can install external l…☆13Oct 29, 2019Updated 6 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- You'll find all the resources and presentations I have used in my talks and workshops☆12Nov 16, 2024Updated last year
- Subdomain enumeration using Cloudflare's scanning tool.☆47Jul 11, 2025Updated 7 months ago
- • The first blockchain records both the consensus protocol and transaction data on chain. • Built multi fiat-based stable coins, e.g. EUR…☆12Nov 14, 2018Updated 7 years ago
- d_5tr☆10Aug 26, 2021Updated 4 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- Extract username and passwords from IPTV urls☆12Nov 8, 2025Updated 3 months ago
- Android application that incorporates E-wallet functionalities through a Chat-Bot☆10Nov 21, 2018Updated 7 years ago
- This tool is for pranking your friends😂. It will send messages to your friend on WhatsApp Web automatically at fixed interval (e.g. afte…☆11Apr 12, 2021Updated 4 years ago
- Playing music in Python3☆11Jun 12, 2025Updated 8 months ago
- Tooll for sql injections scan☆11Jul 17, 2018Updated 7 years ago
- ☆12Jul 13, 2020Updated 5 years ago
- ☆22Nov 22, 2025Updated 3 months ago
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- https://github.com/DarkSecDevelopers/HiddenEye.git☆14Apr 27, 2020Updated 5 years ago
- ☆15Mar 17, 2022Updated 3 years ago
- A tool which can perform advance recon automatically. Sit back and enjoy this tool work for you and find target's subdomains automaticall…