☆19Apr 29, 2015Updated 10 years ago
Alternatives and similar repositories for shodan-search
Users that are interested in shodan-search are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Search bing with python☆12Sep 25, 2014Updated 11 years ago
- Sniffs an interface/pcap file and concatenates fragmented packet loads☆22Feb 26, 2015Updated 11 years ago
- Scrape google search results☆94Aug 24, 2018Updated 7 years ago
- Concurrently test bing results for shellshock vulnerability☆42Sep 27, 2014Updated 11 years ago
- Metasploit Framework☆11Apr 18, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Jan 30, 2021Updated 5 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆15Apr 5, 2019Updated 7 years ago
- E-mails, subdomains and names Harvester - OSINT☆13Feb 26, 2018Updated 8 years ago
- Parses Nmap XML files☆25Apr 29, 2015Updated 10 years ago
- Search google for shellshock vulnerable sites☆27Oct 10, 2014Updated 11 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆168Feb 18, 2015Updated 11 years ago
- .Net library to create Maltego transformations.☆17Feb 11, 2025Updated last year
- Does some google dorks against a domain☆166Jan 20, 2020Updated 6 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Simple, hand-picked list of fuzz strings☆34Nov 5, 2016Updated 9 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- Reconnaissance test in Kubernetes clusters☆21Oct 19, 2018Updated 7 years ago
- Fake SMB and SAMR data☆11Oct 27, 2019Updated 6 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Jun 19, 2018Updated 7 years ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 5 years ago
- A cronjob controller written in bash.☆14Jan 21, 2026Updated 2 months ago
- Find wifi channel with least interference☆54Jul 21, 2019Updated 6 years ago
- Phishing Toolkit☆19Feb 20, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆17May 16, 2018Updated 7 years ago
- ☆17Nov 25, 2015Updated 10 years ago
- Admin for☆16Jun 3, 2018Updated 7 years ago
- create customized .onion addresses for your hidden service,make shallot and eschalot tools☆13Jan 18, 2022Updated 4 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a firewall-evading backdoor, and reroutin…☆10Dec 23, 2014Updated 11 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21May 1, 2017Updated 8 years ago
- Official Black Hat Arsenal Security Tools Repository☆14Dec 7, 2017Updated 8 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14May 29, 2018Updated 7 years ago
- Automates some pentest jobs via nmap xml file☆324Sep 7, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Automated Subnet Scanner☆26Feb 25, 2025Updated last year
- Tiniest ELF (Executable and Linkable Format) executable☆14Aug 27, 2018Updated 7 years ago
- Just Another URL Shortener☆43Aug 20, 2025Updated 7 months ago
- The third open source piece of ransomware using bash☆15Aug 18, 2015Updated 10 years ago
- Finds public elite anonymity proxies and concurrently tests them☆251Nov 23, 2016Updated 9 years ago
- Converts a command to a base64 powershell compatible string☆27Jul 31, 2014Updated 11 years ago
- ARP spoof then session jack within your browser☆28Feb 10, 2014Updated 12 years ago