0dayCTF / awesome-shodan-queries
π A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ π©βπ»
β17Updated 5 years ago
Alternatives and similar repositories for awesome-shodan-queries:
Users that are interested in awesome-shodan-queries are comparing it to the libraries listed below
- Stuff about it-security that might be good to knowβ20Updated 5 years ago
- π€ The Modern Port Scanner π€β17Updated 3 years ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving conβ¦β129Updated 8 months ago
- Simple HTTP listener for security testingβ15Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTFβ43Updated 3 years ago
- A Powerful Intruder written in Pythonβ11Updated 3 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.β105Updated 3 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vectβ¦β75Updated 6 months ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securitβ¦β102Updated last year
- Collection of extra pentest tools for Kali Linuxβ103Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.β38Updated last year
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate dataβ54Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actualβ¦β59Updated 3 years ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written β¦β131Updated 8 months ago
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ34Updated 2 years ago
- β64Updated last year
- β25Updated last week
- Hacking with PasteJacking techniqueβ21Updated 8 months ago
- Pentest/Red Team: Resources, repos and scripts.β68Updated 3 weeks ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via β¦β42Updated 8 months ago
- Subdomain Bruteforce - Bounty Quick Codeβ30Updated 6 months ago
- Xfinity / Comcast Wordlist Generatorβ60Updated 2 years ago
- CTF toolboxβ15Updated 4 years ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux πΎβ69Updated last year
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)β16Updated 8 months ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-hβ¦β68Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitationβ38Updated 2 years ago
- Malwarekid python BadUSB payload encoder for generating powershell script in bas64β23Updated 4 months ago
- Ded Security Framework is a tool aimed at security professionalsβ34Updated 10 months ago
- Social Engineering Browser Update Attack.β56Updated last year