NSE script which leverages the Censys Search API for passive data collection
☆58Dec 3, 2021Updated 4 years ago
Alternatives and similar repositories for nmap-censys
Users that are interested in nmap-censys are comparing it to the libraries listed below
Sorting:
- Bro analyzer that detects Google's QUIC protocol☆10Mar 2, 2021Updated 5 years ago
- recon-ng modules for Censys☆37Oct 23, 2023Updated 2 years ago
- Extract TLS metadata from connection in JSON format.☆15Sep 29, 2020Updated 5 years ago
- A full-fledged msfrpc library for Metasploit framework.☆13Aug 5, 2017Updated 8 years ago
- Collection of offensive tools targeting Microsoft Azure☆10Jun 9, 2022Updated 3 years ago
- This repository contains a mindmap for different techniques for using Censys Search☆15Sep 17, 2025Updated 5 months ago
- HTTPFuzzer is a simple python script to perform multiple fuzzing techniques for HTTP protocol☆13Aug 24, 2018Updated 7 years ago
- irCRpull is a PowerShell script utilized to pull several system artifacts, utilizing the free tool CrowdResponse, from a live Win7+ syste…☆14Mar 25, 2015Updated 10 years ago
- Useful commands for pentesting Linux and Windows systems☆14Jul 18, 2020Updated 5 years ago
- ☆14Apr 9, 2019Updated 6 years ago
- CVE, reports, research☆15Mar 17, 2021Updated 4 years ago
- ☆14Feb 15, 2022Updated 4 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Mar 31, 2021Updated 4 years ago
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- wp content injection mass exploit Perl Script☆12Jul 11, 2017Updated 8 years ago
- Source code of "TRAP: Targeted Random Adversarial Prompt Honeypot for Black-Box Identification", ACL2024 (findings)☆14Nov 20, 2024Updated last year
- Extracts Azure authentication tokens from PowerShell process minidumps.☆25May 20, 2023Updated 2 years ago
- CLI tools using Harpoon features☆24Nov 7, 2023Updated 2 years ago
- ☆20Nov 2, 2019Updated 6 years ago
- Use WordPress pingback.ping to transfer files.☆16Feb 25, 2024Updated 2 years ago
- ☆39Nov 24, 2022Updated 3 years ago
- Attempts to determine the configuration, behavior, and type of a remote MQTT broker☆16Mar 26, 2019Updated 6 years ago
- ☆16Apr 21, 2023Updated 2 years ago
- PoC for CVE-2024-42327 / ZBX-25623☆18Dec 3, 2024Updated last year
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆48Jan 11, 2023Updated 3 years ago
- ☆15Sep 21, 2019Updated 6 years ago
- Web application pentesting recon☆23Jul 25, 2020Updated 5 years ago
- ☆12Jul 29, 2019Updated 6 years ago
- Simple shell script for automated domain recognition with some tools☆20Mar 9, 2019Updated 6 years ago
- home! sweet home☆25Aug 23, 2019Updated 6 years ago
- XML-RPC Vulnerability Checker and Directory Fuzzer☆22Sep 28, 2023Updated 2 years ago
- The plugin repository for Honeycomb, the honeypot framework by Cymmetria☆27Oct 19, 2023Updated 2 years ago
- ☆25Nov 20, 2023Updated 2 years ago
- OSINT tool to find info about your old pages.☆19Mar 19, 2022Updated 3 years ago
- w3af packaging for Kali distribution☆26Nov 29, 2015Updated 10 years ago
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Mar 14, 2021Updated 4 years ago
- Nmap NSE scripts that have been customised or created☆105Oct 26, 2021Updated 4 years ago
- URL / IP / Email defanging with Javascript. Make IoC harmless.☆30Nov 10, 2024Updated last year