0x27 / shodan_key_checker
Quick script written for sorting and categorizing Shodan API keys acquired via scraping the internet.
☆55Updated last year
Alternatives and similar repositories for shodan_key_checker:
Users that are interested in shodan_key_checker are comparing it to the libraries listed below
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 6 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Updated 4 years ago
- A simple python reverse shell written just for fun.☆64Updated 2 years ago
- Simple Webshell Scanner☆50Updated 10 years ago
- Red Login: SSH Brute-force Tools☆102Updated 6 years ago
- Samurai Email Discovery - SED is a email discovery framework that grabs emails via google dork, company name, or domain name.☆83Updated 6 years ago
- pentest toolbox☆28Updated 2 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆29Updated 7 months ago
- web information gathering / Grab links☆42Updated 5 years ago
- Tool to automatic leak information using Hacking with engine searches☆92Updated 6 years ago
- Unofficial WhatCMS API package☆42Updated 3 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 5 years ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆21Updated 8 years ago
- mosquito - Automating reconnaissance and brute force attacks☆129Updated 5 years ago
- Python script for trying default passwords for some TP-Link Hotspots☆35Updated 3 years ago
- Orb is a massive footprinting tool.☆45Updated 5 years ago
- ☆60Updated 7 years ago
- Small backdoor using cookie.☆59Updated 8 years ago
- Script is a proof of concept how to control your machine by using social media sites.☆19Updated 7 years ago
- Phishing webapp generator☆41Updated 6 years ago
- wifi attacks suite☆59Updated 4 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Modern problems require modern solutions☆31Updated 2 years ago
- A continuously curated list of my favorite links and resources relating to Open Source Intelligence gathering.☆18Updated 6 years ago
- Python script based on aireplay-ng to keep deauthenticating the specified stations from your WiFi network.☆50Updated 8 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 6 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆82Updated 6 years ago
- SQLi Google Dork Scanner☆60Updated 3 years ago
- Simple Karma Attack☆67Updated 4 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆204Updated 5 years ago