ssh public host key scanner using shodan
☆118Mar 11, 2019Updated 6 years ago
Alternatives and similar repositories for ssh_keyscanner
Users that are interested in ssh_keyscanner are comparing it to the libraries listed below
Sorting:
- ☆14May 13, 2018Updated 7 years ago
- Scraps for publicly accessible MongoDB instances and dumps user passwords☆33Mar 4, 2016Updated 9 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Jul 8, 2015Updated 10 years ago
- Automatically scan the inner network to detect whether they are vulnerable.☆141Apr 17, 2021Updated 4 years ago
- Automates searching Shodan for vulnerable systems in your neighborhood.☆12Jul 16, 2020Updated 5 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- A collection of exploits for different VoIP products.☆262Feb 9, 2026Updated 2 weeks ago
- DNS Sub-domain brute forcer, in Python + gevent☆50Dec 9, 2016Updated 9 years ago
- Masscan integrated with Shodan API☆44Jul 12, 2017Updated 8 years ago
- RCE Exploit PoC for XMLDecoder☆63Aug 1, 2013Updated 12 years ago
- ☆17Sep 14, 2017Updated 8 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- S2-055的环境,基于rest-show-case改造☆37Dec 7, 2017Updated 8 years ago
- DoS PoC's for SAP products☆51Jan 23, 2018Updated 8 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 7 years ago
- EXIF-based command and control PoC☆15Mar 20, 2020Updated 5 years ago
- A tool to exploit .NET DCOM for EoP and RCE. Is fixed in latest versions of the .NET.☆92Oct 14, 2014Updated 11 years ago
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Nov 3, 2015Updated 10 years ago
- 多线程探测弱密码程序☆32Apr 28, 2020Updated 5 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago
- 一个半自动化命令注入漏洞Fuzz工具(One Semi-automation command injection vulnerability Fuzz tool)☆92Sep 28, 2017Updated 8 years ago
- CVE-2018-8021 Proof-Of-Concept and Exploit☆106Dec 3, 2018Updated 7 years ago
- 复现Django漏洞时的部分环境,推荐使用virtualenv还原部分漏洞☆12May 18, 2017Updated 8 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- SA-CORE-2018-004 POC #drupalgeddon3☆41Apr 28, 2018Updated 7 years ago
- golang program to send RSS feeds per E-Mail☆10Sep 1, 2025Updated 6 months ago
- A web spider for shodan.io without using the Developer API.☆33Jan 4, 2018Updated 8 years ago
- ☆243Dec 29, 2018Updated 7 years ago
- Different utility scripts for pentesting and hacking.☆45Nov 10, 2017Updated 8 years ago
- ☆27Apr 16, 2017Updated 8 years ago
- Some sample code from my Zero Nights 2017 presentation.☆60Nov 19, 2017Updated 8 years ago
- 一个攻击框架☆10May 29, 2015Updated 10 years ago
- 超精简的POC扫描框架☆10Aug 5, 2019Updated 6 years ago
- Asynchronous MSF RPC API wrapper☆20Dec 8, 2022Updated 3 years ago
- ☆21Oct 22, 2019Updated 6 years ago
- Hashfind - A tool to search files for matching password hash types and other interesting data.☆18Feb 12, 2015Updated 11 years ago
- A POC for the Huge Dirty Cow vulnerability (CVE-2017-1000405)☆201Nov 30, 2017Updated 8 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆66Dec 21, 2015Updated 10 years ago
- SkyRAT - Powershell Remote Administration Tool☆33Jan 8, 2018Updated 8 years ago