0dayCTF / awesome-shodan-queriesLinks
🔍 A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ 👩💻
☆21Updated 5 years ago
Alternatives and similar repositories for awesome-shodan-queries
Users that are interested in awesome-shodan-queries are comparing it to the libraries listed below
Sorting:
- 🤖 The Modern Port Scanner 🤖☆19Updated 4 years ago
- Simple HTTP listener for security testing☆16Updated 2 years ago
- A Discord bot that searches the dark web for your query and returns links and screenshots of the results to your discord channel using ah…☆91Updated last year
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools th…☆51Updated 5 years ago
- ☆20Updated 2 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆51Updated 4 years ago
- Stuff about it-security that might be good to know☆22Updated 5 years ago
- Malwarekid python BadUSB payload encoder for generating powershell script in bas64☆23Updated 9 months ago
- Pentest/Red Team: Resources, repos and scripts.☆72Updated 3 weeks ago
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆147Updated 10 months ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆79Updated last year
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆95Updated 2 years ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆133Updated last year
- Automate installation of extra pentest tools on Kali Linux☆55Updated 4 years ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆138Updated 2 years ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆125Updated 11 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 11 months ago
- A single script to install important Pentesting Tools and wordlists on Debian based Linux OS.☆41Updated last month
- Hacking with PasteJacking technique☆22Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.☆14Updated 2 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆49Updated last year
- ClatsCracker is a versatile Executable & Python based password-cracking tool supporting 25 hash algorithms. It offers dictionary or brute…☆55Updated 2 months ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆62Updated last year
- A tool for WI-FI penetration testing that automates your attacking processes.☆37Updated 5 months ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆174Updated last year
- A Powerful Intruder written in Python☆16Updated 3 years ago
- This is a exploit with the capability to control ip camera movement even without a username and password.☆61Updated 4 months ago
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆25Updated 4 years ago
- Xfinity / Comcast Wordlist Generator☆63Updated 2 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆63Updated 4 years ago