HatBashBR / ShodanHatView external linksLinks
search for hosts info with shodan
☆233Jun 14, 2021Updated 4 years ago
Alternatives and similar repositories for ShodanHat
Users that are interested in ShodanHat are comparing it to the libraries listed below
Sorting:
- A payload stager using PowerShell☆183Dec 15, 2019Updated 6 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Apr 12, 2017Updated 8 years ago
- discontinued☆527Aug 17, 2023Updated 2 years ago
- Shodanwave is a tool for exploring and obtaining information from Netwave IP Camera.☆262Nov 15, 2020Updated 5 years ago
- LinkedInt: A LinkedIn scraper for reconnaissance during adversary simulation☆488May 23, 2023Updated 2 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆442Jul 11, 2017Updated 8 years ago
- AWS S3 Bucket/Object Finder☆25Nov 11, 2017Updated 8 years ago
- Extract subdomains from SSL certificates in HTTPS sites.☆388Mar 3, 2025Updated 11 months ago
- Identify the different types of hashes used to encrypt passwords.☆10Mar 12, 2017Updated 8 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- A Phishing Dropper designed to Pentest.☆276May 15, 2017Updated 8 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- Python based script for Information Gathering.☆105Jan 13, 2026Updated last month
- HTA encryption tool for RedTeams☆1,425Nov 9, 2022Updated 3 years ago
- FireShodanMap is a Realtime map that integrates Firebase, Google Maps and Shodan. A search is carried out using Shodan searching vulnerab…☆126May 25, 2018Updated 7 years ago
- The Hacker's ToolBox☆191Jun 29, 2017Updated 8 years ago
- Python 3.5+ DNS asynchronous brute force utility☆669Oct 22, 2023Updated 2 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆116Feb 12, 2019Updated 7 years ago
- A tool to generate media files with malicious metadata☆129Feb 2, 2019Updated 7 years ago
- Fucking Search Engines Scraper - python library to scrap url's from search engines☆49Sep 6, 2017Updated 8 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆21Mar 31, 2017Updated 8 years ago
- Opinionated organisation-centric OSINT footprinting inspired from recon-ng and Maltego☆177Jul 29, 2017Updated 8 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Jun 30, 2017Updated 8 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.☆600Jul 18, 2021Updated 4 years ago
- Collection of Scripts for shodan searching stuff.☆1,137Jan 14, 2026Updated last month
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆225May 8, 2021Updated 4 years ago
- transform your payload.exe into one fake word doc (.ppt)☆470Dec 8, 2019Updated 6 years ago
- ☆66Feb 10, 2018Updated 8 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,111Nov 3, 2017Updated 8 years ago
- Advanced Hash Manipulation☆175Oct 14, 2019Updated 6 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆247Nov 11, 2020Updated 5 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆190Oct 16, 2018Updated 7 years ago
- Advanced reconnaissance utility☆992Nov 20, 2023Updated 2 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- unix SSH post-exploitation 1337 tool☆142Dec 16, 2018Updated 7 years ago
- NXcrypt - 'python backdoor' framework☆368Jun 26, 2017Updated 8 years ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆304Oct 27, 2017Updated 8 years ago
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆470Nov 14, 2019Updated 6 years ago