censys / censys-recon-ng
recon-ng modules for Censys
☆36Updated 10 months ago
Related projects: ⓘ
- ☆33Updated 6 years ago
- Information-Gathering Shell Script☆28Updated 3 years ago
- Another Subdomain ENumeration Tool☆10Updated last year
- Create visualization from Shodan query☆70Updated 3 years ago
- Selenium based web scraper to generate passwords list☆50Updated 4 years ago
- Censys Maltego transforms! Take advantage of Censys transforms for Maltego to back your investigations with the most trusted Internet dat…☆35Updated last year
- OSINT tool for discovering confidential data leaked on Github.☆47Updated last year
- NSE script which leverages the Censys Search API for passive data collection☆56Updated 2 years ago
- autocrack adds queue support for hashcat cracking.☆42Updated last year
- Collect OSINT from git repositories☆18Updated 3 years ago
- ☆27Updated 5 years ago
- Small python script wrapper for automating hashcat commands☆32Updated 3 years ago
- ☆18Updated 5 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆56Updated 4 years ago
- Enumerate a target Based off of Nmap Results☆77Updated 10 months ago
- ☆48Updated this week
- Import Nmap scans to Cherrytree☆36Updated 2 years ago
- ☆17Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆71Updated 4 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated last year
- Skills To Improve Before Heading to OSCP☆15Updated 7 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated 5 months ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆48Updated 3 years ago
- Create wordlists from source codes files/directories for enumeration☆30Updated last year
- Vagrant file and scripting for easy, disposable Kali Linux virtualization☆21Updated 4 years ago
- Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.☆24Updated 2 weeks ago
- ☆20Updated last year
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆64Updated 2 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆18Updated 3 years ago
- An nmap script to produce target lists for use with various tools.☆33Updated 3 years ago