abdulkadir-gungor / Shodan_SearchLinks
Based on the Shodan API, it displays the open ports and security vulnerabilities of the server related to the entered ip or hostname.
☆16Updated 4 years ago
Alternatives and similar repositories for Shodan_Search
Users that are interested in Shodan_Search are comparing it to the libraries listed below
Sorting:
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 3 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆39Updated 3 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- Enumeration & fingerprint tool☆24Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated last year
- Classic Web shell upload techniques & Web RCE techniques☆32Updated 9 months ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆20Updated 3 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆64Updated 2 years ago
- Personal notes from Red teamer for Blue/Red/Purple.☆56Updated last year
- ☆16Updated 3 years ago
- Custom pentesting tools☆25Updated 4 years ago
- Site fast fuzzing with chorme extension.☆25Updated 3 years ago
- A powerful reverse shell generator☆44Updated 3 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆18Updated 2 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 2 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆25Updated 4 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated 2 months ago
- C2Matrix Automation☆12Updated last year
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender res…☆31Updated last year
- redteamrecipe.com☆23Updated last year
- Recon-ng modules for basic OSINT.☆11Updated 3 years ago
- razorAP, Bash and Python tool used to generate Fake Access Points for Wi-Fi networks with 802.1X authentication.☆21Updated 10 months ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 3 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Updated 3 years ago
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- 「🚪」Linux Backdoor based on ICMP protocol☆64Updated 8 months ago
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- Cannon is a post-exploitation framework fully developed using python3. You will be able to download and upload files, run pre-defined mod…☆19Updated 4 years ago