Tool for searching Exploits from Exploit Databases, etc.
☆300Mar 30, 2026Updated 2 weeks ago
Alternatives and similar repositories for go-exploitdb
Users that are interested in go-exploitdb are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Build a local copy of Security Tracker. Notify via E-mail/Slack if there is an update.☆150Mar 9, 2026Updated last month
- Build a local copy of OVAL. Server mode for easy querying.☆97Apr 6, 2026Updated last week
- CVEs <--> Metasploit-Framework modules☆25Mar 9, 2026Updated last month
- Build a local copy of CVE (NVD and Japanese JVN). Server mode for easy querying.☆410Apr 6, 2026Updated last week
- Build a local copy of CPE(Common Platform Enumeration)☆106Mar 9, 2026Updated last month
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.☆25Mar 9, 2026Updated last month
- BoltWiZ, the ultimate UI tool for navigating and managing your BoltDB files with ease and precision.☆20Mar 15, 2024Updated 2 years ago
- Complex payload encoder☆240Jan 20, 2024Updated 2 years ago
- 更快速的进行Web应用指纹识别☆171May 9, 2019Updated 6 years ago
- A Go library for CPE (A Common Platform Enumeration 2.3)☆41Jun 27, 2023Updated 2 years ago
- Easy setup tool for Vuls☆81Sep 2, 2025Updated 7 months ago
- Modular C2 framework aiming to ease post exploitation for red teamers.☆194May 22, 2022Updated 3 years ago
- Finding potential software vulnerabilities from git commit messages☆422Oct 7, 2023Updated 2 years ago
- 获取系统KB补丁对于的MS号☆24Aug 18, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 5 years ago
- Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices☆12,104Updated this week
- Generates permutations, alterations and mutations of subdomains. Auto Resolve what we find.☆11Dec 8, 2020Updated 5 years ago
- Tool to fuzz for interesting vhost.☆24Jan 8, 2025Updated last year
- A fully automated, reliable, super-fast, scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.☆397Dec 11, 2024Updated last year
- Really stupid re-implementation of invoke-wmiexec☆218Feb 25, 2023Updated 3 years ago
- Go bindings for YARA☆387Jul 1, 2025Updated 9 months ago
- teler Resource Collections☆36Updated this week
- 获取可用全球公共dns,可用于域名爆破数据源☆11Nov 30, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- JSON Web Token Hack Toolkit☆981Mar 29, 2026Updated 2 weeks ago
- 漏洞测试环境 - 方便写扫描器利用复现☆27Aug 12, 2019Updated 6 years ago
- Returns results from Google search.☆52Dec 2, 2022Updated 3 years ago
- golang version for nmap service and application version detection (without nmap installation)☆171Sep 23, 2020Updated 5 years ago
- Struts2漏洞扫描利用工具 - Golang版. Struts2 Scanner Written in Golang☆572Jan 10, 2022Updated 4 years ago
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆91May 2, 2024Updated last year
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆7,621Updated this week
- common methods that used by my burp extension projects☆52Apr 12, 2024Updated 2 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Mar 2, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Behinder3.0 Beta4 源码(Decompile and Fixed)☆207Sep 1, 2020Updated 5 years ago
- 一款集成了Nuclei模板管理、多空间引擎搜索的网络安全工具集。为安全研究人员提供高效的工作体验。☆22Mar 16, 2026Updated 3 weeks ago
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆39May 5, 2024Updated last year
- A powerful browser crawler for web vulnerability scanners☆3,026Mar 11, 2025Updated last year
- gozero: the wannabe zero dependency runtime for Go developers (experimental)☆25Updated this week
- 🏵 Gee is tool of stdin to each files and stdout. It is similar to the tee command, but there are more functions for convenience. In addi…☆85Sep 30, 2025Updated 6 months ago
- RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.☆1,563Aug 20, 2024Updated last year