Shodan.io Command Line Interface
☆43Jul 10, 2021Updated 4 years ago
Alternatives and similar repositories for Shogun
Users that are interested in Shogun are comparing it to the libraries listed below
Sorting:
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆15May 17, 2020Updated 5 years ago
- Multi source CVE/exploit parser.☆27Aug 30, 2017Updated 8 years ago
- Port scanning and domain utility.☆29Sep 8, 2017Updated 8 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆116Feb 12, 2019Updated 7 years ago
- A small Php package to fetch archive url snapshots from archive.org. Using it you can fetch complete list of snapshot urls of any year or…☆19Jun 20, 2021Updated 4 years ago
- BlackOrphan is a tool built with Bash/nodeJs mainly for gaining a remote shell access to a Linux Box☆11Jan 19, 2017Updated 9 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 5 years ago
- Gichidan - CLI wrapper for Ichidan deep-web search engine.☆32Apr 20, 2018Updated 7 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆27Jan 6, 2020Updated 6 years ago
- A fully featured backdoor that uses Gmail as a C&C server☆19Oct 13, 2015Updated 10 years ago
- Find your router's default password☆14Apr 7, 2015Updated 10 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Nov 15, 2019Updated 6 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆24Sep 14, 2017Updated 8 years ago
- 📡 A security research tool with shodan integration☆25Sep 6, 2018Updated 7 years ago
- EasyCTF Writeups☆13Jan 10, 2015Updated 11 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 6 years ago
- Get tweets and save file in JSON format without Twitter API☆11Jan 1, 2019Updated 7 years ago
- GUI wireless 802.11 penetration tool☆12Oct 7, 2016Updated 9 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆167Aug 23, 2019Updated 6 years ago
- Simple Bash script to retrieve basic system information.☆30Apr 14, 2018Updated 7 years ago
- Metasploit Usage Wiki☆48Feb 26, 2015Updated 11 years ago
- Active Directory information dumper via LDAP☆13Mar 5, 2020Updated 5 years ago
- Python script to find subdomains☆11Aug 22, 2025Updated 6 months ago
- Artefacts from various retefe campaigns☆10Mar 9, 2019Updated 6 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- Wardriving ekoparty☆15Oct 9, 2017Updated 8 years ago
- ☆16May 9, 2016Updated 9 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Oct 7, 2024Updated last year
- Check local or remote list of DNS servers for suitability in DNS Amplification DoS.☆44Mar 30, 2019Updated 6 years ago
- Local Transform Wrapper for Maltego☆11May 24, 2016Updated 9 years ago
- Bulk hostname lookup using shodan☆14Jun 1, 2022Updated 3 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- Finds dynamic DNS (like no-ip.org) domains from a given list of domains☆14Sep 17, 2015Updated 10 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13May 11, 2018Updated 7 years ago
- Suite for Information gathering☆12Jul 2, 2018Updated 7 years ago