censys-workshop / censys-search-mindmap
This repository contains a mindmap for different techniques for using Censys Search
☆12Updated last year
Related projects ⓘ
Alternatives and complementary repositories for censys-search-mindmap
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 7 months ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 2 years ago
- ☆28Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated last year
- A tool that adds reproducible UUIDs to YARA rules☆13Updated 6 months ago
- ☆16Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 4 months ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- ☆36Updated 2 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- Tool for scanning domains for .git directories.☆13Updated last year
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Automate All Pivoting System Enumeration with this Bash Script☆11Updated 2 years ago
- Distributed phishing framework designed to streamline offensive security phishing☆39Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆38Updated last year
- A tool for simplifying the process of researching IOCs.☆24Updated 3 years ago
- ☆20Updated last year
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆16Updated 3 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆16Updated 2 years ago
- Small python script wrapper for automating hashcat commands☆35Updated 3 years ago
- self-hosted Azure OSINT tool☆23Updated 2 months ago
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆19Updated 3 years ago
- ☆17Updated last year
- ☆13Updated 2 years ago
- Noob Penetration tester☆10Updated 6 months ago