abdulkadir-gungor / Shodan_Search
Based on the Shodan API, it displays the open ports and security vulnerabilities of the server related to the entered ip or hostname.
☆16Updated 4 years ago
Alternatives and similar repositories for Shodan_Search:
Users that are interested in Shodan_Search are comparing it to the libraries listed below
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆22Updated 9 months ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆21Updated 2 months ago
- Automate Auxiliary Module in Metasploit☆20Updated 4 years ago
- Enumeration & fingerprint tool☆24Updated last year
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- MalDev & AV-EDR Evasion for Pentesters☆15Updated 2 years ago
- ☆12Updated 2 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆39Updated 3 years ago
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆14Updated 5 months ago
- 「🚪」The hidden hookless backdoor☆12Updated 4 months ago
- Classic Web shell upload techniques & Web RCE techniques☆29Updated 5 months ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated last week
- Cannon is a post-exploitation framework fully developed using python3. You will be able to download and upload files, run pre-defined mod…☆19Updated 3 years ago
- Tactics, Techniques, and Procedures☆25Updated 3 months ago
- A tool to check for response status codes with ease☆14Updated last year
- CVE-2024-52940 - A zero-day vulnerability in AnyDesk's "Allow Direct Connections" feature, discovered and registered by Ebrahim Shafiei (…☆35Updated 5 months ago
- Simple recon tool automates your recon process☆16Updated 2 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆47Updated last year
- Powershell modules and commands that come in handy for pentests and red team assessments.☆17Updated 6 years ago
- Red Team Stuffs☆19Updated 2 years ago
- NoSQL Injection Tool to bypass login forms & extract usernames/passwords using regular expressions.☆30Updated 3 years ago
- Browser-based QRLJacking tool written in pure JavaScript. For educational use only.☆18Updated 7 months ago
- xdebug 2.5.5 RCE exploit☆30Updated 3 months ago
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆30Updated 2 years ago
- Rust Weaponization for Red Team Engagements.☆11Updated 2 years ago
- ShellC0de Generator☆11Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- DataReaper is a powerful Python tool designed to harvest data from publicly accessible HTTP servers. It combines the capabilities of Shod…☆11Updated last year