TheLeopardsH / Shodan
Filters for Shodan Search engine to find vulnerbilities devices connected to internet
☆12Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for Shodan
- Custom pentesting tools☆24Updated 4 years ago
- A PowerShell script for helping to find vulnerable settings in AD Group Policy.☆12Updated 5 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆30Updated last week
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- ☆36Updated 2 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated last year
- Pentesting notes☆17Updated last year
- A little cheatsheet for NetExec☆16Updated 6 months ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 3 weeks ago
- This is a site I made for easily hosting tools and payload over apache2 on Kali Linux so they are always ready to go. These are a collect…☆13Updated 2 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 3 years ago
- An advanced multithreaded admin panel finder written in python.☆13Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 2 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- A repository of compiled and ready-to-use shells for Windows restricted environments.☆35Updated 4 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 4 months ago
- Tool to crawl, visualize and interact with SQL server links in a d3 graph to help in your red/blue/purple/.../risk assessments pentest …☆19Updated 4 years ago
- HiveNightmare a.k.a. SeriousSam Local Privilege Escalation in Windows – CVE-2021-36934☆8Updated 3 years ago
- A command-line utility for auditing DNS configuration using Zonemaster API☆28Updated last year
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆43Updated 2 years ago
- A web front-end for password cracking and analytics☆13Updated 5 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆31Updated 2 years ago
- OWASP Foundation Web Respository☆35Updated 3 years ago
- A golang tool that uses the dehashed.com API to search for compromised assets.☆8Updated 3 years ago
- ☆12Updated 3 years ago
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆36Updated 2 weeks ago