Loubaris / scrapeaw
ScrapeAW is a framework that without API scrape IPs across the world using Shodan
☆11Updated 10 months ago
Alternatives and similar repositories for scrapeaw:
Users that are interested in scrapeaw are comparing it to the libraries listed below
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆9Updated last year
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 3 years ago
- Small python or powershell script to look for potential subdomain takeover vulnerabilities via vulnerable Alias.☆8Updated 3 years ago
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- DataReaper is a powerful Python tool designed to harvest data from publicly accessible HTTP servers. It combines the capabilities of Shod…☆11Updated last year
- This repository presents a proof-of-concept of CVE-2023-22527☆12Updated last year
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated last year
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated 2 years ago
- Automate Blind SQL Injection with Python.☆21Updated 2 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 11 months ago
- ☆13Updated last week
- your bestfried for finding LinkedIn Employees on github☆16Updated 2 years ago
- Python3 tool to perform password spraying using RDP☆16Updated last year
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆14Updated 10 months ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆21Updated 10 months ago
- x86_64 LKM linux rootkit☆16Updated last year
- A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticat…☆8Updated 10 months ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- Beacon Object Files used for Cobalt Strike☆17Updated last year
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆12Updated last year
- Check for the existence of an email on Google platforms☆13Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Updated 8 months ago
- Red Team Infrastructure: Covenant C2☆10Updated 4 years ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆15Updated last year
- Yet Another Memory Analyzer for malware detection☆24Updated last year
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆15Updated 3 years ago