exploit-database topic

List exploit-database repositories

URL Infection (Silent Java Drive By) URL Infection Exploit Silent Java Drive by downloads may happen when visiting a site, opening an e-mail message. It may even happen by clicking on a malicious pop-...

URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.

Google-Hacking-Tool

21
Stars
2
Forks
Watchers

A java based google hacking tool that allows to do advanced search on google, also to search in google hacking database and exploit database..

SearchSploit.py

15
Stars
6
Forks
Watchers

Independant repo to my fork of exploitdb

ronin-app

26
Stars
8
Forks
Watchers

A local web interface for Ronin.