0dayCTF / awesome-shodan-queriesLinks
π A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ π©βπ»
β21Updated 5 years ago
Alternatives and similar repositories for awesome-shodan-queries
Users that are interested in awesome-shodan-queries are comparing it to the libraries listed below
Sorting:
- Stuff about it-security that might be good to knowβ23Updated 5 years ago
- Simple HTTP listener for security testingβ16Updated 2 years ago
- π€ The Modern Port Scanner π€β19Updated 4 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTFβ50Updated 4 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via β¦β47Updated 11 months ago
- β18Updated 3 weeks ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-hβ¦β76Updated last year
- Malwarekid python BadUSB payload encoder for generating powershell script in bas64β23Updated 8 months ago
- Browse the web entirely over SMS β no apps required.β9Updated 10 years ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.β95Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.β14Updated 2 years ago
- Social Engineering Browser Update Attack.β56Updated last year
- Pentest/Red Team: Resources, repos and scripts.β71Updated 2 weeks ago
- A single script to install important Pentesting Tools and wordlists on Debian based Linux OS.β40Updated last week
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cusβ¦β30Updated 2 years ago
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.β139Updated 9 months ago
- Automate installation of extra pentest tools on Kali Linuxβ57Updated 4 years ago
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resourcesβ23Updated 4 years ago
- Hacking with PasteJacking techniqueβ22Updated last year
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools thβ¦β51Updated 4 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actualβ¦β61Updated 4 years ago
- Testing POC for use casesβ14Updated 7 months ago
- ClatsCracker is a versatile Executable & Python based password-cracking tool supporting 25 hash algorithms. It offers dictionary or bruteβ¦β52Updated 3 weeks ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.β137Updated last year
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vectβ¦β75Updated 10 months ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSRβ¦β125Updated 10 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving conβ¦β131Updated 11 months ago
- A Discord bot that searches the dark web for your query and returns links and screenshots of the results to your discord channel using ahβ¦β86Updated 11 months ago
- SuperVision is an open source "Google Maps" for hackers developed by CosmodiumCS. SuperVision's map centralizes public data and maps it. β¦β47Updated last year
- A bash and powershell script to download the latest version of Burp-Suite Professional and use it for free.β18Updated 2 years ago