0x27 / shodan_key_checker
Quick script written for sorting and categorizing Shodan API keys acquired via scraping the internet.
☆54Updated last year
Alternatives and similar repositories for shodan_key_checker:
Users that are interested in shodan_key_checker are comparing it to the libraries listed below
- Red Login: SSH Brute-force Tools☆102Updated 6 years ago
- Samurai Email Discovery - SED is a email discovery framework that grabs emails via google dork, company name, or domain name.☆80Updated 6 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 6 years ago
- Check local or remote list of DNS servers for suitability in DNS Amplification DoS.☆47Updated 5 years ago
- Unofficial WhatCMS API package☆42Updated 3 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Updated 4 years ago
- A simple python reverse shell written just for fun.☆64Updated last year
- Check your email(s) using popular online services to see if it appears in any data-breach☆28Updated 6 months ago
- A search tool that searches Offensive Securitys Exploit-db and Shodans Exploit DB using their API.☆38Updated 10 years ago
- Python script for trying default passwords for some TP-Link Hotspots☆35Updated 3 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆82Updated 6 years ago
- Python based script for Information Gathering.☆106Updated 7 months ago
- some python3 functions to add spreading features to any python backdoor☆51Updated 7 years ago
- SQLi Google Dork Scanner☆60Updated 3 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 6 years ago
- Some wordpress user enumeration scripts.☆39Updated 8 years ago
- Phishing webapp generator☆41Updated 6 years ago
- Orb is a massive footprinting tool.☆45Updated 5 years ago
- OSINT tool for testing privacy and social engineering vulnerability of organizations.☆92Updated 5 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆82Updated 3 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆25Updated 7 years ago
- Small backdoor using cookie.☆59Updated 8 years ago
- Convert your masscan/subdomain-scan results (80,443,8080) into screenshots for better analysis☆36Updated 6 years ago
- Ruby based reverse IP-lookup tool.☆55Updated 4 years ago
- Tool to automatic leak information using Hacking with engine searches☆92Updated 6 years ago