3vangel1st / kamerka
Build interactive map of cameras from Shodan
☆23Updated 5 years ago
Alternatives and similar repositories for kamerka:
Users that are interested in kamerka are comparing it to the libraries listed below
- Python script to parse JSON data exported from SHODAN nad create IP:PORT list to use with other tools☆24Updated 7 years ago
- ☆29Updated 2 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆13Updated 4 years ago
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆37Updated 3 years ago
- ☆91Updated 2 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆25Updated 5 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆57Updated 5 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Updated 4 years ago
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆54Updated 4 years ago
- ☆52Updated 4 months ago
- Unique wordlist generator of unique wordlists.☆43Updated last year
- ☆48Updated 4 years ago
- Blind XSS service alerting over slack or email☆31Updated 5 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 4 years ago
- Burp extension for quickly copying request/response data.☆29Updated 3 weeks ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated 11 months ago
- ☆33Updated 2 months ago
- Another Subdomain ENumeration Tool☆11Updated 2 years ago
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 2 years ago
- Information-Gathering Shell Script☆29Updated 4 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- Clickjacking PoC Generator☆35Updated 4 years ago
- Basic tool to automate backdooring PE files☆54Updated 3 years ago