Command line search and download tool for Vulners Database inspired by searchsploit.
Project description
Command line search and download tool for Vulners Database inspired by searchsploit. It allows you to search online for the exploits across all the most popular collections: Exploit-DB, Metasploit, Packetstorm and others. The most powerful feature is immediate exploit source download right in your working path.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
getsploit-1.0.0.tar.gz
(9.1 kB
view details)
Built Distribution
File details
Details for the file getsploit-1.0.0.tar.gz
.
File metadata
- Download URL: getsploit-1.0.0.tar.gz
- Upload date:
- Size: 9.1 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/4.0.2 CPython/3.11.7
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 7c15d2e93bb1af70e9ade4ebf97e9c937a2ee31239d1e319b59f586c342aa659 |
|
MD5 | 4f5bf0c159dd3fc41bfbdc9c8948aa68 |
|
BLAKE2b-256 | 0b2fef1aa656732b0bdad82a02371b1f7bd89dc70eab9382d76c92c37c5bd0c6 |
File details
Details for the file getsploit-1.0.0-py3-none-any.whl
.
File metadata
- Download URL: getsploit-1.0.0-py3-none-any.whl
- Upload date:
- Size: 8.5 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/4.0.2 CPython/3.11.7
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | bda5788bf3ef5447ebc46c576cbbc43be0469933822918cb3ccaedd7354c31dd |
|
MD5 | d5330554970cee774a1bdee765463b06 |
|
BLAKE2b-256 | 2cfe1028f588f24e327146ddc6555c8ac910e52abfd77f4af5e54a30b4267ecf |