Tool for searching Exploits from Exploit Databases, etc.
☆299Mar 9, 2026Updated 2 weeks ago
Alternatives and similar repositories for go-exploitdb
Users that are interested in go-exploitdb are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Build a local copy of Security Tracker. Notify via E-mail/Slack if there is an update.☆150Mar 9, 2026Updated 2 weeks ago
- Build a local copy of OVAL. Server mode for easy querying.☆96Mar 9, 2026Updated 2 weeks ago
- CVEs <--> Metasploit-Framework modules☆25Mar 9, 2026Updated 2 weeks ago
- Build a local copy of CVE (NVD and Japanese JVN). Server mode for easy querying.☆406Mar 16, 2026Updated last week
- Build a local copy of CPE(Common Platform Enumeration)☆106Mar 9, 2026Updated 2 weeks ago
- Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.☆25Mar 9, 2026Updated 2 weeks ago
- Hourly updated database of exploit and exploitation reports☆259Jan 23, 2025Updated last year
- Complex payload encoder☆241Jan 20, 2024Updated 2 years ago
- Easy setup tool for Vuls☆81Sep 2, 2025Updated 6 months ago
- A Go library for CPE (A Common Platform Enumeration 2.3)☆41Jun 27, 2023Updated 2 years ago
- 更快速的进行Web应用指纹识别☆171May 9, 2019Updated 6 years ago
- Modular C2 framework aiming to ease post exploitation for red teamers.☆194May 22, 2022Updated 3 years ago
- Finding potential software vulnerabilities from git commit messages☆420Oct 7, 2023Updated 2 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 5 years ago
- 获取系统KB补丁对于的MS号☆24Aug 18, 2019Updated 6 years ago
- Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices☆12,070Updated this week
- ☆191Mar 16, 2026Updated last week
- Generates permutations, alterations and mutations of subdomains. Auto Resolve what we find.☆11Dec 8, 2020Updated 5 years ago
- Tool to fuzz for interesting vhost.☆24Jan 8, 2025Updated last year
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Sep 27, 2024Updated last year
- BoltWiZ, the ultimate UI tool for navigating and managing your BoltDB files with ease and precision.☆19Mar 15, 2024Updated 2 years ago
- A fully automated, reliable, super-fast, scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.☆397Dec 11, 2024Updated last year
- Really stupid re-implementation of invoke-wmiexec☆217Feb 25, 2023Updated 3 years ago
- Go bindings for YARA☆387Jul 1, 2025Updated 8 months ago
- teler Resource Collections☆36Updated this week
- 获取可用全球公共dns,可用于域名爆破数据源☆11Nov 30, 2019Updated 6 years ago
- JSON Web Token Hack Toolkit☆980Updated this week
- 漏洞测试环境 - 方便写扫描器利用复现☆27Aug 12, 2019Updated 6 years ago
- Returns results from Google search.☆52Dec 2, 2022Updated 3 years ago
- Crashbench is a LLM benchmark to measure bug-finding and reporting capabilities of LLMs☆14Mar 8, 2026Updated 2 weeks ago
- golang version for nmap service and application version detection (without nmap installation)☆171Sep 23, 2020Updated 5 years ago
- Struts2漏洞扫描利用工具 - Golang版. Struts2 Scanner Written in Golang☆571Jan 10, 2022Updated 4 years ago
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆90May 2, 2024Updated last year
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆7,581Updated this week
- common methods that used by my burp extension projects☆52Apr 12, 2024Updated last year
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Mar 2, 2022Updated 4 years ago
- Behinder3.0 Beta4 源码(Decompile and Fixed)☆207Sep 1, 2020Updated 5 years ago
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆39May 5, 2024Updated last year
- A powerful browser crawler for web vulnerability scanners☆3,021Mar 11, 2025Updated last year