abdulkadir-gungor / Shodan_SearchLinks
Based on the Shodan API, it displays the open ports and security vulnerabilities of the server related to the entered ip or hostname.
☆16Updated 4 years ago
Alternatives and similar repositories for Shodan_Search
Users that are interested in Shodan_Search are comparing it to the libraries listed below
Sorting:
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆40Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated last year
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- Enumeration & fingerprint tool☆24Updated last year
- Site fast fuzzing with chorme extension.☆24Updated 3 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆53Updated 3 years ago
- C2Matrix Automation☆14Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆32Updated 3 years ago
- Bash script to generate reverse shell payloads☆20Updated 2 years ago
- ☆17Updated 3 years ago
- Personal notes from Red teamer for Blue/Red/Purple.☆56Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- Multiplatform Telegram Bot in pure PowerShell☆55Updated 2 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆35Updated last week
- SMTP Open Relay Exploitation☆17Updated 5 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆64Updated 3 years ago
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 3 years ago
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆44Updated 6 months ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆21Updated 2 years ago
- NoSQL Injection Tool to bypass login forms & extract usernames/passwords using regular expressions.☆30Updated 4 years ago
- URL / IP / Email defanging with Javascript. Make IoC harmless.☆30Updated last year
- Simple recon tool automates your recon process☆17Updated 2 years ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆48Updated last year
- Browser-based QRLJacking tool written in pure JavaScript. For educational use only.☆17Updated last year
- web application pentesting tools for docker☆18Updated 3 years ago
- Yet Another PHP Shell - The most complete PHP reverse shell☆83Updated 3 years ago