censys / nmap-censysView external linksLinks
NSE script which leverages the Censys Search API for passive data collection
☆58Dec 3, 2021Updated 4 years ago
Alternatives and similar repositories for nmap-censys
Users that are interested in nmap-censys are comparing it to the libraries listed below
Sorting:
- Censys Maltego transforms! Take advantage of Censys transforms for Maltego to back your investigations with the most trusted Internet dat…☆37Jul 11, 2023Updated 2 years ago
- A Postman collection for the Censys Search APIs.☆33Mar 9, 2023Updated 2 years ago
- recon-ng modules for Censys☆37Oct 23, 2023Updated 2 years ago
- A full-fledged msfrpc library for Metasploit framework.☆13Aug 5, 2017Updated 8 years ago
- Collection of offensive tools targeting Microsoft Azure☆10Jun 9, 2022Updated 3 years ago
- VLAN attacks toolkit☆12Sep 1, 2022Updated 3 years ago
- An easy-to-use and lightweight API wrapper for Censys APIs.☆458Jan 12, 2026Updated last month
- irCRpull is a PowerShell script utilized to pull several system artifacts, utilizing the free tool CrowdResponse, from a live Win7+ syste…☆14Mar 25, 2015Updated 10 years ago
- This repository contains a mindmap for different techniques for using Censys Search☆15Sep 17, 2025Updated 4 months ago
- HTTPFuzzer is a simple python script to perform multiple fuzzing techniques for HTTP protocol☆13Aug 24, 2018Updated 7 years ago
- Create lists from nmap output.☆13Jan 27, 2021Updated 5 years ago
- Useful commands for pentesting Linux and Windows systems☆14Jul 18, 2020Updated 5 years ago
- ☆14Apr 9, 2019Updated 6 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Mar 31, 2021Updated 4 years ago
- ☆14Feb 15, 2022Updated 3 years ago
- Source code of "TRAP: Targeted Random Adversarial Prompt Honeypot for Black-Box Identification", ACL2024 (findings)☆14Nov 20, 2024Updated last year
- The missing API for the CISA Known Exploited Vulnerabilities Catalog. This repository contains the source running at kevin.gtfkd.com☆19Jan 9, 2026Updated last month
- wp content injection mass exploit Perl Script☆12Jul 11, 2017Updated 8 years ago
- Perform vulnerabilities lookup on Vulners, the largest vulnerabilities & exploits database☆17Dec 8, 2019Updated 6 years ago
- ☆20Nov 2, 2019Updated 6 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆24May 20, 2023Updated 2 years ago
- this nuclei template finds back up files☆22Aug 25, 2025Updated 5 months ago
- CLI tools using Harpoon features☆24Nov 7, 2023Updated 2 years ago
- Wordpress Plugin "WP Checkout" Mass exploit☆16Jun 18, 2017Updated 8 years ago
- ☆39Nov 24, 2022Updated 3 years ago
- PoC for CVE-2024-42327 / ZBX-25623☆17Dec 3, 2024Updated last year
- Attempts to determine the configuration, behavior, and type of a remote MQTT broker☆16Mar 26, 2019Updated 6 years ago
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Feb 1, 2019Updated 7 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆49Jan 11, 2023Updated 3 years ago
- ☆15Sep 21, 2019Updated 6 years ago
- Web application pentesting recon☆23Jul 25, 2020Updated 5 years ago
- ☆12Jul 29, 2019Updated 6 years ago
- Simple shell script for automated domain recognition with some tools☆20Mar 9, 2019Updated 6 years ago
- The plugin repository for Honeycomb, the honeypot framework by Cymmetria☆27Oct 19, 2023Updated 2 years ago
- XML-RPC Vulnerability Checker and Directory Fuzzer☆22Sep 28, 2023Updated 2 years ago
- home! sweet home☆25Aug 23, 2019Updated 6 years ago
- OSINT tool to find info about your old pages.☆19Mar 19, 2022Updated 3 years ago
- ☆25Nov 20, 2023Updated 2 years ago