censys-workshop / censys-search-mindmap
This repository contains a mindmap for different techniques for using Censys Search
☆12Updated 11 months ago
Related projects ⓘ
Alternatives and complementary repositories for censys-search-mindmap
- A tool that adds reproducible UUIDs to YARA rules☆13Updated 6 months ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 6 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- ☆12Updated 3 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated last year
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Noob Penetration tester☆10Updated 5 months ago
- ☆34Updated 6 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated last month
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated last year
- Automated compromise detection of the world's most popular packages☆15Updated last year
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆19Updated 3 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- Regexes for all the things☆12Updated 3 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Updated 4 years ago
- A simple program to query nmap xml files in the terminal.☆26Updated 4 years ago
- A tool for enumerating and retrieving exposed git repositories to recover source trees from external environments. Can utilise File Inclu…☆20Updated 4 years ago
- ☆10Updated 4 years ago
- ☆28Updated last year
- Pythonize Intruder Payload☆13Updated 3 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆19Updated 6 months ago
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆9Updated 8 years ago
- Extract endpoints from specific Git repository for fuzzing☆21Updated 4 years ago
- Distributed phishing framework designed to streamline offensive security phishing☆39Updated last year