ScadaExposure / Shodan-PHP-REST-API
Advanced PHP5 REST API for Shodan.io
☆94Updated 5 months ago
Related projects: ⓘ
- A web interface to automate Scanning, Generating metasploit payload, Network Testing,Exploring CMS,Information Gathering and much more☆167Updated 9 years ago
- Uniscan web vulnerability scanner☆140Updated 3 years ago
- A PHP Based Tool That Helps You To Manage All Your Backdoored Websites Efficiently.☆120Updated last year
- Recsech is a tool for doing Footprinting and Reconnaissance on the target web. Recsech collects information such as DNS Information, Sub …☆215Updated 4 years ago
- ☆112Updated this week
- Parsero | Robots.txt audit tool☆167Updated 7 years ago
- TOOL - Unauthenticated Remote DNS , Scanner ranger IP.☆90Updated 8 years ago
- Remot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors☆279Updated 3 years ago
- BinGoo! A Linux bash based Bing and Google Dorking Tool☆219Updated 5 years ago
- DoS-Switchblade is a single tool that is a collection of testing tools for DoS☆82Updated 4 years ago
- SVScanner - Scanner Vulnerability And MaSsive Exploit.☆157Updated 5 years ago
- CMS auto detect and exploit.☆361Updated 2 years ago
- Improved DOS exploit for wordpress websites (CVE-2018-6389)☆112Updated 3 years ago
- Tool to automatic leak information using Hacking with engine searches☆91Updated 6 years ago
- Nikto for Windows with some extra features.☆175Updated 7 years ago
- WPHunter A Wordpress Vulnerability Scanner☆159Updated 6 years ago
- information gathering via dorks☆373Updated 2 years ago
- [DON'T USE ME] plain ol' web apps scanner☆146Updated 8 years ago
- DMitry (Deepmagic Information Gathering Tool)☆194Updated 2 months ago
- Social Engineering Tool Oriented to facebook☆53Updated 7 years ago
- Advanced Web Browser Fingerprinting☆42Updated 7 years ago
- Passive Vulnerability Auditor☆128Updated 8 years ago
- search for hosts info with shodan☆226Updated 3 years ago
- WPSploit - Exploiting Wordpress With Metasploit☆213Updated 6 years ago
- Let's find someone's account☆161Updated 5 years ago
- This class can be used to retrieve remote Web pages using the TOR network. It can connect to an HTTP proxy server that accesses the TOR …☆52Updated 12 years ago
- A Blind SQL Exploitation application☆79Updated 12 years ago
- CIDRAM: Classless Inter-Domain Routing Access Manager.☆109Updated this week
- IP Cam Shell is a command line script for testing and exploiting a wide range of IP cameras as demonstrated by Craig Heffner in "Exploiti…☆129Updated 7 years ago
- CookieCatcher☆135Updated 11 years ago