Quick script written for sorting and categorizing Shodan API keys acquired via scraping the internet.
☆57Sep 5, 2023Updated 2 years ago
Alternatives and similar repositories for shodan_key_checker
Users that are interested in shodan_key_checker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Search GitHub for public Shodan api keys☆83Oct 18, 2023Updated 2 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Jul 8, 2015Updated 10 years ago
- Firewall bypass script based on shodan search results☆14Jun 5, 2019Updated 6 years ago
- Use your Shodan API Key to dump all the contents of exposed memcached servers.☆142Mar 12, 2018Updated 8 years ago
- ☆14May 6, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Tools for encrypting and decrypting Yealink configuration and key files☆12Nov 2, 2013Updated 12 years ago
- bash script to enumerate vulnerabilities on specific year through Shodan API☆46Dec 5, 2018Updated 7 years ago
- a script that is fairly reliable for web OSINT☆12Jul 20, 2021Updated 4 years ago
- Simple checker for ok.ru partial private data disclosure☆13Oct 5, 2023Updated 2 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆24May 26, 2018Updated 7 years ago
- An execute-assembly compatible tool for spraying local admin hashes on an Active Directory domain.☆18Apr 30, 2021Updated 4 years ago
- Imports IP address and CIDR information into a SQLite Database format☆15Feb 25, 2026Updated last month
- Static Decryptor for IcedID Malware☆18Oct 1, 2022Updated 3 years ago
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- IDA Pro Instruction Reference Plugin☆14Oct 2, 2019Updated 6 years ago
- PSIKOTIK TSO User Enumerator☆17Aug 24, 2017Updated 8 years ago
- CVE-2021-33766-poc☆10Sep 15, 2021Updated 4 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆32Jul 9, 2012Updated 13 years ago
- OSINT tool to search, parse and dump only the open Elasticsearch and MongoDB directories that have the data you care about exposing☆49Jan 10, 2022Updated 4 years ago
- random perl scripts that may be usefull [2007]☆15Nov 21, 2015Updated 10 years ago
- translator from CronosPlus export into SQL☆17Jul 6, 2016Updated 9 years ago
- List of all Memcached Servers that are vulnerable to DDoS attack vector☆10Dec 21, 2020Updated 5 years ago
- Nginx alias traversal vulnerable environments for study☆15May 8, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆14Sep 22, 2019Updated 6 years ago
- ☆16Aug 11, 2017Updated 8 years ago
- Scrape pastes from pastebin and archive them for review☆17Mar 6, 2019Updated 7 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Apr 21, 2017Updated 8 years ago
- - Automated Discord bot for Submitting Rebates and getting you easy visa cards. Educational purposes only.☆16May 13, 2021Updated 4 years ago
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Aug 7, 2017Updated 8 years ago
- A search tool that searches Offensive Securitys Exploit-db and Shodans Exploit DB using their API.☆40May 6, 2014Updated 11 years ago
- ☆14Oct 25, 2019Updated 6 years ago
- Domain, IPv4 & v6 address & network information gathering, web server analysis, DNS- & BGP- related information☆12Nov 29, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- 通过Shizuku授权,实现修改部分系统设置项。☆17Apr 1, 2024Updated 2 years ago
- ESXi Cyber Security Incident Response Script☆27Sep 4, 2024Updated last year
- An upconverter from 0-6GHz to 740THz☆30Jul 24, 2018Updated 7 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆65Aug 9, 2019Updated 6 years ago