Vulners Python API wrapper
☆372Feb 26, 2026Updated 3 weeks ago
Alternatives and similar repositories for api
Users that are interested in api are comparing it to the libraries listed below
Sorting:
- Vulnerability scanner based on vulners.com search API☆887Oct 1, 2025Updated 5 months ago
- Agent scanner for vulners.com☆95Nov 2, 2025Updated 4 months ago
- Command line utility for searching and downloading exploits☆1,814Sep 10, 2025Updated 6 months ago
- Sorta reverse implementation of ShoVAT - Also includes NMAP banner regex results☆16Dec 28, 2018Updated 7 years ago
- Arachni is one of the famous web scanner. This project is python script to handle arachni api.☆13Jun 4, 2018Updated 7 years ago
- intercepting kali router☆443Aug 31, 2017Updated 8 years ago
- ☆12May 9, 2017Updated 8 years ago
- Vulners signature-base software version detection rules☆38Nov 9, 2021Updated 4 years ago
- Chrome < 62 uxss exploit (CVE-2017-5124)☆160Nov 14, 2017Updated 8 years ago
- Various Tools and Docker Images☆280Apr 26, 2025Updated 10 months ago
- NSE script based on Vulners.com API☆3,368Sep 26, 2025Updated 5 months ago
- Open-source pentesting management and automation platform by Salesforce Product Security☆599Feb 12, 2022Updated 4 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆292Oct 28, 2017Updated 8 years ago
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆471Nov 14, 2019Updated 6 years ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,293Jul 10, 2024Updated last year
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- An exploit for Apache Struts CVE-2017-9805☆247Nov 7, 2017Updated 8 years ago
- Vulnerability scanner based on vulners.com audit API☆199Sep 2, 2018Updated 7 years ago
- Create randomly insecure VMs☆2,747Updated this week
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Nov 29, 2017Updated 8 years ago
- A Tool for Domain Flyovers☆5,912May 22, 2022Updated 3 years ago
- A database of common, interesting or useful commands, in one handy referable form☆754Jan 30, 2024Updated 2 years ago
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆946May 28, 2021Updated 4 years ago
- JavaScript Reversed TCP Meterpreter Stager☆138May 25, 2017Updated 8 years ago
- tool to extract passwords from TeamViewer memory using Frida☆464Jul 17, 2018Updated 7 years ago
- Tools for auditing WAFS☆465Nov 24, 2020Updated 5 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆729Nov 19, 2017Updated 8 years ago
- Result files from various fuzzing runs☆16Oct 18, 2021Updated 4 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,019Sep 11, 2017Updated 8 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆378Oct 12, 2020Updated 5 years ago
- MSDAT: Microsoft SQL Database Attacking Tool☆989Aug 1, 2023Updated 2 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- honeyλ - a simple, serverless application designed to create and monitor fake HTTP endpoints (i.e. URL honeytokens) automatically, on top…☆522Oct 20, 2018Updated 7 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆39Dec 23, 2017Updated 8 years ago
- A framework for Backdoor development!☆434Mar 18, 2018Updated 8 years ago
- raven is a Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees usin…☆796May 18, 2020Updated 5 years ago
- The Outlook HTML Leak Test Project☆130May 12, 2018Updated 7 years ago
- First IDE for Nmap Script (NSE) Development.☆359Aug 8, 2020Updated 5 years ago