ssh public host key scanner using shodan
☆118Mar 11, 2019Updated 7 years ago
Alternatives and similar repositories for ssh_keyscanner
Users that are interested in ssh_keyscanner are comparing it to the libraries listed below
Sorting:
- Scraps for publicly accessible MongoDB instances and dumps user passwords☆33Mar 4, 2016Updated 10 years ago
- Automates searching Shodan for vulnerable systems in your neighborhood.☆12Jul 16, 2020Updated 5 years ago
- DNS Sub-domain brute forcer, in Python + gevent☆50Dec 9, 2016Updated 9 years ago
- A collection of exploits for different VoIP products.☆262Mar 6, 2026Updated 2 weeks ago
- ☆14May 13, 2018Updated 7 years ago
- Different utility scripts for pentesting and hacking.☆45Nov 10, 2017Updated 8 years ago
- Automatically scan the inner network to detect whether they are vulnerable.☆141Apr 17, 2021Updated 4 years ago
- A web spider for shodan.io without using the Developer API.☆33Jan 4, 2018Updated 8 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Jul 8, 2015Updated 10 years ago
- Firewall bypass script based on shodan search results☆14Jun 5, 2019Updated 6 years ago
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Nov 3, 2015Updated 10 years ago
- FireShodanMap is a Realtime map that integrates Firebase, Google Maps and Shodan. A search is carried out using Shodan searching vulnerab…☆126May 25, 2018Updated 7 years ago
- ☆17Sep 14, 2017Updated 8 years ago
- ☆27Apr 16, 2017Updated 8 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- 📡 A security research tool with shodan integration☆25Sep 6, 2018Updated 7 years ago
- RCE Exploit PoC for XMLDecoder☆63Aug 1, 2013Updated 12 years ago
- S2-055的环境,基于rest-show-case改造☆37Dec 7, 2017Updated 8 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 7 years ago
- Masscan integrated with Shodan API☆44Jul 12, 2017Updated 8 years ago
- st2-046-poc CVE-2017-5638☆21Aug 17, 2018Updated 7 years ago
- Contacts Synchronization Private Directory Public Directory City Search Profession Search☆11Oct 21, 2017Updated 8 years ago
- cve-2014-0130 rails directory traversal vuln☆19May 15, 2017Updated 8 years ago
- 复现Django漏洞时的部分环境,推荐使用virtualenv还原部分漏洞☆12May 18, 2017Updated 8 years ago
- Sorta reverse implementation of ShoVAT - Also includes NMAP banner regex results☆16Dec 28, 2018Updated 7 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- 多线程探测弱密码程序☆32Apr 28, 2020Updated 5 years ago
- golang program to send RSS feeds per E-Mail☆10Sep 1, 2025Updated 6 months ago
- A wordpress security auditor! Audit your wordpress application for security issues with even 1 request.☆40Jan 13, 2026Updated 2 months ago
- CVE-2018-8021 Proof-Of-Concept and Exploit☆106Dec 3, 2018Updated 7 years ago
- 一个攻击框架☆10May 29, 2015Updated 10 years ago
- Some sample code from my Zero Nights 2017 presentation.☆60Nov 19, 2017Updated 8 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆66Dec 21, 2015Updated 10 years ago
- DoS PoC's for SAP products☆51Jan 23, 2018Updated 8 years ago
- Information gathering & website reconnaissance | https://phishstats.info/☆456May 27, 2019Updated 6 years ago
- SpiderLabs shared Nmap Tools☆231Aug 7, 2020Updated 5 years ago
- Automates some pentest jobs via nmap xml file☆325Sep 7, 2018Updated 7 years ago