PaulSec / SearchShodanLinks
This is a basic example of how to search into Shodan using the ShodanAPI.
☆16Updated 11 years ago
Alternatives and similar repositories for SearchShodan
Users that are interested in SearchShodan are comparing it to the libraries listed below
Sorting:
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Updated 4 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
- SWF Vulnerability & Information Scanner☆18Updated 7 years ago
- DPE - Default Password Enumeration☆36Updated 12 years ago
- Various exploits☆10Updated 8 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 6 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- Software exploitation training material☆16Updated 8 years ago
- Phishing Toolkit☆19Updated 7 years ago
- Notes on offensive training☆16Updated 8 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- :e-mail: Enumerate usernames through SMTP service☆17Updated 6 years ago
- python tools to assist in penetration testing☆14Updated last week
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 7 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- Framework for Man-In-The-Middle attacks☆14Updated 7 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 6 years ago
- GUI Tool to generate threat intelligence information in various formats☆44Updated 7 years ago
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Updated 8 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆57Updated 7 years ago
- Wardriving ekoparty☆15Updated 8 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- Honeypot for router backdoor (TCP 32764)☆19Updated 11 years ago
- ☆20Updated 12 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆52Updated 5 years ago
- DNS logging, detection, ...☆15Updated 3 years ago
- Perl script to test the reliability of a list of open web proxies.☆31Updated 8 years ago