3vangel1st / kamerka
Build interactive map of cameras from Shodan
☆23Updated 5 years ago
Alternatives and similar repositories for kamerka:
Users that are interested in kamerka are comparing it to the libraries listed below
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.☆24Updated 4 years ago
- A simple program to query nmap xml files in the terminal.☆28Updated 4 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆37Updated 3 years ago
- Information-Gathering Shell Script☆30Updated 4 years ago
- Python script to parse JSON data exported from SHODAN nad create IP:PORT list to use with other tools☆25Updated 7 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 4 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- ☆52Updated 5 months ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 10 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆25Updated 7 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆18Updated 2 weeks ago
- All the members of bugbounty and infosec. If you don't know who to follow, see!☆35Updated 2 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Updated 4 years ago
- ☆48Updated 4 years ago
- Subdomain Enumeration and Scanner☆33Updated 4 years ago
- Tools and resources for web app hacking. The payloads.txt documents are a must have for your Burpsuite intruder payload armory. They've h…☆27Updated 5 years ago
- 💣 Dockerized penetration-testing/bugbounty/app-sec testing environment☆32Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Unique wordlist generator of unique wordlists.☆42Updated last year
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆39Updated 4 years ago
- asnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the …☆26Updated 4 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- S3 bucket enumerator☆29Updated 6 years ago
- A quick reference script that can easily display reverse shells for different languages.☆21Updated 4 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago