Quantika14 / ShoditaView external linksLinks
Proyecto sobre cómo crear tu propio Shodan de casa con algunas mejoras.
☆35Feb 21, 2017Updated 8 years ago
Alternatives and similar repositories for Shodita
Users that are interested in Shodita are comparing it to the libraries listed below
Sorting:
- WhatsApp Forensic Tool☆174Jul 15, 2020Updated 5 years ago
- Flunym0us is a Vulnerability Scanner for Wordpress and Moodle designed by Flu Project Team. Flunym0us has been developed in Python. Flun…☆28Jan 15, 2017Updated 9 years ago
- EO-RIPPER.PY es una herramienta que nos permite hacer OSINT con un email o con una lista de emails.☆75Oct 2, 2020Updated 5 years ago
- Gadget Pentesting Tool Scripts☆37Nov 29, 2015Updated 10 years ago
- ☆38Apr 29, 2020Updated 5 years ago
- Ultimate Internet of Things/Industrial Control Systems reconnaissance tool.☆11Feb 11, 2022Updated 4 years ago
- ☆10Nov 18, 2021Updated 4 years ago
- scavenger is a ruby brute forcing script that uses Typhoeus gem to enable parallelization and sends multiple http requests with various p…☆11Aug 25, 2021Updated 4 years ago
- Run PowerShell command without invoking powershell.exe☆12Sep 2, 2017Updated 8 years ago
- Taller Plug 'Em All. Introducción al Internet de las Cosas (IOT) con prácticas basadas en AdafruitIO y Wemos D1 Mini☆12Feb 7, 2020Updated 6 years ago
- suricata rules to pcap☆10Mar 25, 2021Updated 4 years ago
- An EXPERIMENTAL charter for the W3C Decentralized Identifier Working Group☆10Dec 29, 2020Updated 5 years ago
- ☆11Dec 13, 2021Updated 4 years ago
- ☆11Apr 14, 2017Updated 8 years ago
- jQuery plugin to create a circle Path-like menu☆15Oct 27, 2015Updated 10 years ago
- Wifi Killer is an app that will /rekt anything on the network you are connect to.☆12Feb 24, 2015Updated 10 years ago
- A tool to list plugins installed on a wordpress powered website.☆11Jun 20, 2024Updated last year
- Malicious traffic detection system☆11Nov 2, 2022Updated 3 years ago
- Remote control retroshare-nogui from your Android device☆35Sep 4, 2013Updated 12 years ago
- A set of tools to develop NEO smart contracts☆14Mar 1, 2018Updated 7 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Dec 18, 2016Updated 9 years ago
- Example for the Google Chrome cache attack to inject custom code into web pages (macOS, Linux, browser version: 124.0.6367.62 and older)☆12May 10, 2024Updated last year
- ☆13Oct 11, 2016Updated 9 years ago
- Interact with the ESP8266 deauther script via discord☆11Mar 29, 2018Updated 7 years ago
- A game to show how organize and mantains a gdg comunity☆12Jan 2, 2018Updated 8 years ago
- Toy web crawler☆21Jan 25, 2012Updated 14 years ago
- Differents WebShell usefull for CTF☆12Jul 21, 2017Updated 8 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Try to bruteforce several cypher algorithms that can be used in CTFs☆13Jun 20, 2022Updated 3 years ago
- Edición de la documentación de Micropython de Asociación Python Canarias☆10Jun 4, 2019Updated 6 years ago
- Selenium based bot that automatize the creation of accounts in a web page☆14Nov 2, 2022Updated 3 years ago
- FICTIZIA » Curso de JavaScript para desarrolladores web — 10ª Edición☆16Jul 10, 2018Updated 7 years ago
- A toy Linux rootkit.☆13May 10, 2013Updated 12 years ago
- Send an issue to propose a talk☆17Jul 12, 2019Updated 6 years ago
- Flask Dashboard - Shards Design | AppSeed☆16Oct 4, 2023Updated 2 years ago
- First steps with Jupyter Notebook and Data Science☆11Aug 3, 2018Updated 7 years ago
- Scrapy project to fetch movies data from IMDB and put on MySQL DB. It download movie covers also and more scrapers will be done on future…☆15Aug 28, 2012Updated 13 years ago
- ☆14Dec 28, 2020Updated 5 years ago
- ☆17Feb 12, 2022Updated 4 years ago