0dayCTF / awesome-shodan-queriesLinks
π A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ π©βπ»
β20Updated 5 years ago
Alternatives and similar repositories for awesome-shodan-queries
Users that are interested in awesome-shodan-queries are comparing it to the libraries listed below
Sorting:
- Stuff about it-security that might be good to knowβ22Updated 5 years ago
- Simple HTTP listener for security testingβ16Updated 2 years ago
- π€ The Modern Port Scanner π€β19Updated 3 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTFβ49Updated 4 years ago
- Browse the web entirely over SMS β no apps required.β9Updated 10 years ago
- Xfinity / Comcast Wordlist Generatorβ63Updated 2 years ago
- Automate installation of extra pentest tools on Kali Linuxβ56Updated 4 years ago
- capNcook - a dark web exploration toolβ72Updated last year
- A Powerful Intruder written in Pythonβ15Updated 3 years ago
- CTF toolboxβ17Updated 4 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.β14Updated 2 years ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate dataβ56Updated last year
- Malwarekid python BadUSB payload encoder for generating powershell script in bas64β23Updated 7 months ago
- Autofill Phishingβ72Updated 5 months ago
- β17Updated 10 months ago
- β20Updated last year
- A bash and powershell script to download the latest version of Burp-Suite Professional and use it for free.β17Updated 2 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via β¦β45Updated 10 months ago
- Hacking with PasteJacking techniqueβ22Updated 11 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving conβ¦β129Updated 10 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vectβ¦β75Updated 9 months ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actualβ¦β61Updated 4 years ago
- Collection of extra pentest tools for Kali Linuxβ104Updated 2 years ago
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resourcesβ22Updated 4 years ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.β13Updated 5 years ago
- Ded Security Framework is a tool aimed at security professionalsβ35Updated last year
- Bookmarklet to find endpoints easily with one clickβ60Updated last year
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bountyβ40Updated 9 months ago
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.β135Updated 7 months ago
- A single script to install important Pentesting Tools and wordlists on Debian based Linux OS.β22Updated this week