H5a337230 / ZKShSView external linksLinks
Search shodan without any knowledge about its queries
☆42May 14, 2022Updated 3 years ago
Alternatives and similar repositories for ZKShS
Users that are interested in ZKShS are comparing it to the libraries listed below
Sorting:
- Contacts Synchronization Private Directory Public Directory City Search Profession Search☆11Oct 21, 2017Updated 8 years ago
- Fast scanner for exposed env files☆14Nov 14, 2022Updated 3 years ago
- Make exploiting race conditions in web applications highly efficient and ease-of-use.☆27Jun 18, 2025Updated 7 months ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆12Aug 9, 2020Updated 5 years ago
- A Tool using Shodan and RTSP to find vulnerable cameras around the world.☆60Feb 9, 2021Updated 5 years ago
- Templating with sinister modules☆16Jun 20, 2023Updated 2 years ago
- pen testing scripts☆12Feb 7, 2021Updated 5 years ago
- Simple golang reverse shell☆20Jan 22, 2020Updated 6 years ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆16Dec 14, 2020Updated 5 years ago
- Infecting PE☆25Mar 10, 2014Updated 11 years ago
- A number of scripts POC's and problems solved as pentests move along.☆44Jun 6, 2024Updated last year
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- Handy script to automate the attack☆22Dec 19, 2019Updated 6 years ago
- Collection of nmap nse scripts☆23May 15, 2019Updated 6 years ago
- 📡 A security research tool with shodan integration☆25Sep 6, 2018Updated 7 years ago
- A simple Shellshock scanner in python☆39Oct 12, 2014Updated 11 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆57Jan 10, 2018Updated 8 years ago
- The program allows to download large data from shodan quickly, simply and avoid errors.☆29Nov 3, 2020Updated 5 years ago
- quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a3…☆31Jun 12, 2020Updated 5 years ago
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated last month
- Shodan.io connector for Phantom Cyber Security Orchestration☆23Sep 13, 2016Updated 9 years ago
- 💣 REST and SOAP web API fuzzer☆25May 17, 2016Updated 9 years ago
- AMSI Bypass for powershell☆30Apr 26, 2022Updated 3 years ago
- Preventing 3rd Party DLLs from Injecting into your Malware☆25Aug 31, 2021Updated 4 years ago
- XSS scanning with Dalfox on Github-action☆26Nov 26, 2023Updated 2 years ago
- ☆29Apr 20, 2018Updated 7 years ago
- whoareyou is a tool to find the underlying technology/software used in a list of websites passed through stdin (using Wappalyzer dataset)☆32Jun 15, 2020Updated 5 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Mar 6, 2021Updated 4 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆119Jul 6, 2024Updated last year
- Better Google Dorking with Dorker.☆32Aug 28, 2022Updated 3 years ago
- ☆28Jun 10, 2016Updated 9 years ago
- An improved version of Sublist3r, a python based Fast subdomains enumeration tool for penetration testers☆10Feb 10, 2024Updated 2 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- Hiding implants in HTML files☆66Apr 5, 2020Updated 5 years ago
- A web spider for shodan.io without using the Developer API.☆33Jan 4, 2018Updated 8 years ago
- Source for Pentester Land☆39Nov 3, 2022Updated 3 years ago
- hacking tool☆31Jan 14, 2026Updated last month
- This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.doc…☆33Jul 24, 2020Updated 5 years ago