exploit-db
Here are 29 public repositories matching this topic...
Sort:Most stars
Tool to find CVEs and Exploits.
- Updated
Feb 28, 2024 - Python
Nmap script that scans for probable vulnerabilities based on services discovered in open ports.
- Updated
Mar 16, 2025 - Lua
Search an exploit in the local exploitdb database by its CVE
- Updated
Nov 16, 2022 - Python
An advanced graphical search engine for Exploit-DB
- Updated
May 29, 2024 - Python
CRUSH aims to crawl historical vulnerability data from major platforms and monitor daily updates.
- Updated
Aug 2, 2024 - Go
Drupal < 7.58 - Drupalgeddon 3 Authenticated Remote Code Execution (Metasploit)
- Updated
May 1, 2018 - Ruby
Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email if an exploit is found for the supplied query.
- Updated
Aug 5, 2022 - Python
A search engine on information delivered by OSINT sources to support Vulnerability Assessment
- Updated
Feb 16, 2023 - Python
An advanced command-line search engine for Exploit-DB
- Updated
Sep 30, 2021 - Python
Get latest Exploit Databases notification on your Desktop
- Updated
Jan 29, 2020 - Shell
DrXploit is a powerful and open-source penetration testing and exploitation tool for web applications. This tool is designed to automate the process of discovering and exploiting vulnerabilities, saving time and effort for security researchers.
- Updated
Oct 3, 2025 - Python
A loader for bitbucket 2022 rce (cve-2022-36804)
- Updated
Apr 28, 2025 - Python
An information disclosure vulnerability occurs when LibreOffice 6.0.3 and Apache OpenOffice Writer 4.1.5 automatically process and initiate an SMB connection embedded in a malicious file, as demonstrated by "xlink:href=file://192.168.0.2/test.jpg" within an "office:document-content" element in a ".odt XML document".
- Updated
May 3, 2018 - Python
Extract Nmap XML output and lookup services in (Exploit-DB) searchsploit program.
- Updated
May 13, 2017 - Python
Pluck Cms 4.7.18 RCE Exploit
- Updated
Jul 11, 2023 - Python
Source References for Published CVE & Advisory
- Updated
Nov 19, 2021 - Python
Discover the most powerful Google Dorks for ethical hacking, OSINT, and cybersecurity. Find, filter, and use advanced search queries to boost your investigations. Includes real-world examples and practical usage tips.
- Updated
Aug 6, 2025
Improve this page
Add a description, image, and links to theexploit-db topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with theexploit-db topic, visit your repo's landing page and select "manage topics."