0dayCTF / awesome-shodan-queries
π A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ π©βπ»
β18Updated 5 years ago
Alternatives and similar repositories for awesome-shodan-queries:
Users that are interested in awesome-shodan-queries are comparing it to the libraries listed below
- Stuff about it-security that might be good to knowβ18Updated 5 years ago
- Simple HTTP listener for security testingβ14Updated 2 years ago
- π€ The Modern Port Scanner π€β17Updated 3 years ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vectβ¦β75Updated 5 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTFβ42Updated 3 years ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving conβ¦β125Updated 7 months ago
- β25Updated last month
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ34Updated 2 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via β¦β40Updated 7 months ago
- CTF toolboxβ14Updated 4 years ago
- Red Teaming tools and techniquesβ50Updated 2 years ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-hβ¦β66Updated 11 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written β¦β131Updated 7 months ago
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.β133Updated 4 months ago
- Xfinity / Comcast Wordlist Generatorβ59Updated last year
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate dataβ54Updated 11 months ago
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list ofβ¦β44Updated 5 months ago
- Tips, Tricks, and Scripts for Linux Post Exploitationβ38Updated last year
- β42Updated last year
- Tools and Resources for Physical Security Red Teamingβ30Updated last month
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSRβ¦β121Updated 5 months ago
- Mass bruteforce authentication of common services with common credentials.β45Updated last year
- Check out this JavaScript code that extracts URLs from a web page and linked scripts! Perfect for web scraping and penetration testingβ18Updated 7 months ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actualβ¦β59Updated 3 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.β105Updated 2 months ago
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchersβ26Updated 2 months ago
- Automate installation of extra pentest tools on Kali Linuxβ51Updated 3 years ago
- Pentest/Red Team: Resources, repos and scripts.β65Updated 3 weeks ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phoneβ47Updated last year
- Subdomain Bruteforce - Bounty Quick Codeβ30Updated 5 months ago