Here are
23 public repositories
matching this topic...
Updated
Oct 3, 2018
Python
Handbook of information collection for penetration testing and src
collection of verified Linux kernel exploits
Exploit management framework
Updated
Jun 3, 2019
Python
Arissploit Framework is a simple framework designed to master penetration testing tools. Arissploit Framework offers simple structure, basic CLI, and useful features for learning and developing penetration testing tools.
Updated
Aug 29, 2020
Python
Search an exploit in the local exploitdb database by its CVE
Updated
Aug 24, 2020
Python
CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4
Updated
Feb 3, 2020
Python
A search tool that searches Offensive Securitys Exploit-db and Shodans Exploit DB using their API.
A java based google hacking tool that allows to do advanced search on google, also to search in google hacking database and exploit database..
Python - Metasploit-Framework Database Management
Updated
Jun 21, 2020
Python
🚀 Server Directory Traversal at Huawei HG255s ☄️ - CVE-2017-17309 🚀
Updated
Jun 21, 2020
Python
Unofficial API for 0day.today database | Supported languages: Python and PHP
Updated
Dec 23, 2017
JavaScript
Script to process data from the Exploit database for later visualization with D3
Updated
Sep 17, 2014
Python
A tool to remotely scan Linux system packages via SSH
Updated
May 7, 2020
Shell
A Node-based Exploitalert API
Updated
Dec 23, 2017
JavaScript
Updated
Jun 19, 2020
Python
Updated
Jun 13, 2020
Python
Independant repo to my fork of exploitdb
Updated
Sep 22, 2020
Python
Improve this page
Add a description, image, and links to the
exploit-database
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
exploit-database
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.