The official Python library for Shodan
☆2,763Aug 5, 2024Updated last year
Alternatives and similar repositories for shodan-python
Users that are interested in shodan-python are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻☆7,287May 27, 2024Updated last year
- Collection of Scripts for shodan searching stuff.☆1,140Jan 14, 2026Updated 2 months ago
- Metasploit Framework☆37,771Updated this week
- search for hosts info with shodan☆233Jun 14, 2021Updated 4 years ago
- An easy-to-use and lightweight API wrapper for Censys APIs.☆457Feb 20, 2026Updated last month
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Empire is a PowerShell and Python post-exploitation agent.☆7,828Jan 19, 2020Updated 6 years ago
- Fast subdomains enumeration tool for penetration testers☆10,864Aug 2, 2024Updated last year
- In-depth attack surface mapping and asset discovery☆14,282Updated this week
- Web application fuzzer☆6,445Jan 21, 2026Updated 2 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,660Jan 5, 2026Updated 2 months ago
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆25,444Jun 5, 2025Updated 9 months ago
- E-mails, subdomains and names Harvester - OSINT☆15,867Updated this week
- A swiss army knife for pentesting networks☆9,100Dec 6, 2023Updated 2 years ago
- A Tool for Domain Flyovers☆5,912May 22, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,850Nov 10, 2022Updated 3 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆69,663Updated this week
- A little tool to play with Windows security☆21,350May 11, 2025Updated 10 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,912Aug 17, 2020Updated 5 years ago
- Attack Surface Management Platform☆9,466Feb 15, 2026Updated last month
- Shodanwave is a tool for exploring and obtaining information from Netwave IP Camera.☆264Nov 15, 2020Updated 5 years ago
- Exploitation Framework for Embedded Devices☆13,028Mar 2, 2026Updated 3 weeks ago
- DNS Enumeration Script☆2,980Updated this week
- Six Degrees of Domain Admin☆10,558Mar 2, 2026Updated 3 weeks ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆6,237Jan 27, 2026Updated last month
- Web path scanner☆14,114Mar 16, 2026Updated last week
- Automated All-in-One OS Command Injection Exploitation Tool☆5,675Mar 16, 2026Updated last week
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,237Nov 20, 2025Updated 4 months ago
- Impacket is a collection of Python classes for working with network protocols.☆15,560Updated this week
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆17,014Dec 15, 2024Updated last year
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆5,483Feb 13, 2025Updated last year
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,902Jan 24, 2024Updated 2 years ago
- Knock Subdomain Scan☆4,148Feb 19, 2026Updated last month
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Nikto web server scanner☆10,199Updated this week
- Automatic SQL injection and database takeover tool☆36,874Mar 18, 2026Updated last week
- Next generation web scanner☆6,469Oct 19, 2025Updated 5 months ago
- Automated Mass Exploiter☆5,223May 22, 2023Updated 2 years ago
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,851Nov 10, 2023Updated 2 years ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,805Apr 25, 2024Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆76,293Mar 16, 2026Updated last week