Automates searching Shodan for vulnerable systems in your neighborhood.
☆12Jul 16, 2020Updated 5 years ago
Alternatives and similar repositories for starcluster
Users that are interested in starcluster are comparing it to the libraries listed below
Sorting:
- Search shodan without any knowledge about its queries☆42May 14, 2022Updated 3 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 4 years ago
- Attack ms sql servers base on shodan python library and pymssql library☆22Jul 8, 2020Updated 5 years ago
- The program allows to download large data from shodan quickly, simply and avoid errors.☆29Nov 3, 2020Updated 5 years ago
- Python script to parse JSON data exported from SHODAN nad create IP:PORT list to use with other tools☆25Nov 1, 2017Updated 8 years ago
- Get ports,vulnerabilities,informations,banners,..etc for any IP with Shodan (no apikey! no rate-limit!)☆25Jun 3, 2020Updated 5 years ago
- ssh public host key scanner using shodan☆118Mar 11, 2019Updated 6 years ago
- Hacking Tools Z0172CK☆30Jul 11, 2023Updated 2 years ago
- Public repository for Red Canary Research☆38Oct 29, 2020Updated 5 years ago
- FTP server crawler for anonymous login based on shodan☆36Aug 7, 2020Updated 5 years ago
- A wordpress security auditor! Audit your wordpress application for security issues with even 1 request.☆40Jan 13, 2026Updated last month
- Scraps for publicly accessible MongoDB instances and dumps user passwords☆33Mar 4, 2016Updated 10 years ago
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- A human readable log format for Python☆13Nov 3, 2017Updated 8 years ago
- Find your router's default password☆14Apr 7, 2015Updated 10 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- Scripts and payloads for internet-wide network scanning☆17Aug 2, 2015Updated 10 years ago
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Jan 9, 2020Updated 6 years ago
- Diverse collection of 100 Hydrogen Torch Use-Cases by different industries, data-types, and problem types☆11Oct 10, 2024Updated last year
- Very basic Flask example☆10Aug 21, 2019Updated 6 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- The dataset in the paper "Detecting '0-Day' Vulnerability: An Empirical Study of Secret Security Patch in OSS", which appears in the 2019…☆13Aug 9, 2023Updated 2 years ago
- ☆12Feb 13, 2026Updated 2 weeks ago
- A python RCE exploit on QNAP-QTS☆14Sep 15, 2020Updated 5 years ago
- Generic Signature Format for SIEM Systems☆14Oct 27, 2021Updated 4 years ago
- security course list☆14Sep 18, 2015Updated 10 years ago
- ☆10Jan 14, 2022Updated 4 years ago
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago
- Nuclear Powered Command-Line Tools☆12Nov 21, 2018Updated 7 years ago
- This project deals with vulnerability analysis and classification using machine learning techniques i.e. Natural Language Processing.☆10Feb 21, 2019Updated 7 years ago
- Przygotowanie i wysyłka plików JPK☆12Feb 19, 2019Updated 7 years ago
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.☆10Aug 4, 2023Updated 2 years ago
- An intercontinental ballistic simulator☆13Sep 29, 2015Updated 10 years ago
- Real-time face-recognition program. Have fun with OpenCV-python.☆12Feb 26, 2021Updated 5 years ago
- Template injection allows an attacker to include template code into an existant (or not) template. A template engine makes designing HTML…☆13Jan 30, 2020Updated 6 years ago
- A small Python script to get the heart rate data generated from an Apple Watch in a CSV form☆19Jan 4, 2018Updated 8 years ago
- Quantify how special is the observed Local Group kinematics in the LCDM framework☆14Jun 22, 2021Updated 4 years ago
- These are payloads to hunt for various bugs in web applications. from SQLi, xss, RCE to path traversal and more with XSS and fuzzing.☆11Oct 3, 2020Updated 5 years ago
- ☆13Mar 13, 2018Updated 7 years ago