DanMcInerney / shodan-searchView external linksLinks
☆19Apr 29, 2015Updated 10 years ago
Alternatives and similar repositories for shodan-search
Users that are interested in shodan-search are comparing it to the libraries listed below
Sorting:
- Search bing with python☆12Sep 25, 2014Updated 11 years ago
- Concurrently test bing results for shellshock vulnerability☆42Sep 27, 2014Updated 11 years ago
- Scrape google search results☆94Aug 24, 2018Updated 7 years ago
- Metasploit Framework☆11Apr 18, 2019Updated 6 years ago
- Search google for shellshock vulnerable sites☆27Oct 10, 2014Updated 11 years ago
- Parses Nmap XML files☆25Apr 29, 2015Updated 10 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Jan 30, 2021Updated 5 years ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆16Feb 27, 2018Updated 7 years ago
- Does some google dorks against a domain☆165Jan 20, 2020Updated 6 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- Fake SMB and SAMR data☆11Oct 27, 2019Updated 6 years ago
- Admin for☆16Jun 3, 2018Updated 7 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Jun 19, 2018Updated 7 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14May 29, 2018Updated 7 years ago
- Official Black Hat Arsenal Security Tools Repository☆13Dec 7, 2017Updated 8 years ago
- Find wifi channel with least interference☆54Jul 21, 2019Updated 6 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆168Feb 18, 2015Updated 10 years ago
- Simple, hand-picked list of fuzz strings☆34Nov 5, 2016Updated 9 years ago
- .Net library to create Maltego transformations.☆17Feb 11, 2025Updated last year
- Phishing Toolkit☆19Feb 20, 2018Updated 7 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆17May 16, 2018Updated 7 years ago
- Automatically performs the SMB relay attack☆73May 13, 2016Updated 9 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21May 1, 2017Updated 8 years ago
- async web crawler☆31Jun 13, 2014Updated 11 years ago
- Automated Subnet Scanner☆27Feb 25, 2025Updated 11 months ago
- ARP spoof then session jack within your browser☆28Feb 10, 2014Updated 12 years ago
- 📻 Control HackRF devices from Node.js☆23Dec 29, 2025Updated last month
- 📡 Kernel & firmware image to turn a DM500 into a SAT>IP server☆38Mar 27, 2022Updated 3 years ago
- Automates some pentest jobs via nmap xml file☆325Sep 7, 2018Updated 7 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆32Jan 22, 2018Updated 8 years ago
- Arduino and Raspberry PI Development Kit☆10Jun 28, 2017Updated 8 years ago
- TorBOX Next Generation — Build a manageable TOR/I2P middle box on any modern Linux.☆30Oct 2, 2023Updated 2 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆27Aug 23, 2017Updated 8 years ago
- C# AV bypass jank☆33Feb 9, 2021Updated 5 years ago
- Now use your favorite Google Dorks techniques to find vulnerabilities and earn Bounties.☆31Oct 1, 2020Updated 5 years ago
- OSINT Browser Plugins☆38Jun 9, 2017Updated 8 years ago
- Finds public elite anonymity proxies and concurrently tests them☆251Nov 23, 2016Updated 9 years ago
- Combining OSINT sources in Elastic Stack☆77Oct 10, 2020Updated 5 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆37Mar 24, 2014Updated 11 years ago