Handbook of information collection for penetration testing and src
#安卓#Modular penetration testing platform that enables you to write, test, and execute exploit code.
Search an exploit in the local exploitdb database by its CVE
CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4
#搜索#A search tool that searches Offensive Securitys Exploit-db and Shodans Exploit DB using their API.
#网络爬虫#A local web interface for Ronin.
A java based google hacking tool that allows to do advanced search on google, also to search in google hacking database and exploit database..
Independant repo to my fork of exploitdb
Python - Metasploit-Framework Database Management
Unofficial API for 0day.today database | Supported languages: Python and PHP
🚀 Server Directory Traversal at Huawei HG255s ☄️ - CVE-2017-17309 🚀
Exploit development involves tools like exploitation frameworks and CVE databases. LNK exploits, such as LNK builder or LNK payload techniques, leverage vulnerabilities like CVE-2025-44228 for silent ...
Exploit development targets vulnerabilities using tools like exploitation frameworks. CVE databases list risks, while CVE-2025-44228 is an example of a flaw. AnyDesk exploits highlight security gaps.
Exploit development targets vulnerabilities using tools like exploitation frameworks. CVE databases list risks, while CVE-2025-44228 is an example of a flaw. AnyDesk exploits highlight security gaps.
A tool to remotely scan Linux system packages via SSH
Script to process data from the Exploit database for later visualization with D3