censys / censys-recon-ng
recon-ng modules for Censys
☆37Updated last year
Alternatives and similar repositories for censys-recon-ng:
Users that are interested in censys-recon-ng are comparing it to the libraries listed below
- ☆33Updated 3 months ago
- Information-Gathering Shell Script☆30Updated 4 years ago
- ☆18Updated 6 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- Another Subdomain ENumeration Tool☆11Updated 2 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆18Updated 4 years ago
- Automated Google dorking with custom search engines☆27Updated 5 years ago
- An nmap script to produce target lists for use with various tools.☆33Updated 3 years ago
- Create visualization from Shodan query☆72Updated 3 years ago
- Python script to parse JSON data exported from SHODAN nad create IP:PORT list to use with other tools☆26Updated 7 years ago
- Get URLs from the Wayback Machine. Able to handle large outputs.☆22Updated last year
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- NSE script which leverages the Censys Search API for passive data collection☆58Updated 3 years ago
- Censys Maltego transforms! Take advantage of Censys transforms for Maltego to back your investigations with the most trusted Internet dat…☆37Updated last year
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Top password lists generated from leaks collected from different paste sites☆30Updated 2 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- ☆42Updated last month
- Fraud prevention tool☆28Updated 4 years ago
- ☆28Updated 5 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆18Updated 3 weeks ago
- Collaborative web dashboard for RedTeam pentesters☆21Updated 5 years ago
- Unique wordlist generator of unique wordlists.☆42Updated last year
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- Tooling and commands for common red team and Infrastructure testing tasks☆42Updated 2 years ago
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.☆50Updated 6 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆61Updated 3 years ago