censys / censys-recon-ngLinks
recon-ng modules for Censys
☆37Updated last year
Alternatives and similar repositories for censys-recon-ng
Users that are interested in censys-recon-ng are comparing it to the libraries listed below
Sorting:
- NSE script which leverages the Censys Search API for passive data collection☆60Updated 3 years ago
- ☆33Updated 7 months ago
- Create visualization from Shodan query☆75Updated 4 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 5 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- A collection of tools to find data that has been made public in cloud storage systems such as S3 Buckets and Digital Ocean Spaces☆75Updated 3 years ago
- Information-Gathering Shell Script☆30Updated 4 years ago
- Offensive Security recon tool☆92Updated 3 years ago
- OSINT tool for discovering confidential data leaked on Github.☆50Updated last year
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆12Updated 6 years ago
- Journey to Try Harder !!!☆32Updated 5 years ago
- Unique wordlist generator of unique wordlists.☆42Updated 2 years ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆62Updated 4 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- Collaborative pentest tool with highly customizable tools☆75Updated 3 years ago
- Unofficial API & Client for dnsdumpster.com and hackertarget.com☆66Updated 6 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- Passive reconnaissance/enumeration of interesting targets by watching for SSL certificates being issued☆68Updated 2 years ago
- Python script to parse JSON data exported from SHODAN nad create IP:PORT list to use with other tools☆25Updated 7 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆19Updated 6 years ago
- Search (offline) if your password (NTLM or SHA1 format) has been leaked (HIBP passwords list v8)☆60Updated 11 months ago
- An nmap script to produce target lists for use with various tools.☆34Updated 4 years ago
- APT2 is a pentest automation framework that can be used to assist pentesters, blue team members, and others in identifying easily exploit…☆66Updated 6 years ago
- Fraud prevention tool☆28Updated 5 years ago
- Enumerate a target Based off of Nmap Results☆78Updated last year
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆12Updated 6 years ago
- Import Nmap scans to Cherrytree☆37Updated 3 years ago
- Censys Maltego transforms! Take advantage of Censys transforms for Maltego to back your investigations with the most trusted Internet dat…☆38Updated 2 years ago