glennzw / shodan-hq-nseLinks
Shodan HQ nmap plugin - passively scan targets
☆155Updated 9 years ago
Alternatives and similar repositories for shodan-hq-nse
Users that are interested in shodan-hq-nse are comparing it to the libraries listed below
Sorting:
- Common Findings Database☆102Updated 6 years ago
- Automated Responder/secretsdump.py cracking☆187Updated 9 years ago
- unix wildcard attacks☆136Updated 7 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆245Updated 11 years ago
- Mass scanner for the Java serialize bug☆152Updated 4 months ago
- Burp Extender plugin that generates a sitemap of a website using Wayback Machine☆227Updated 7 years ago
- Automated digital reconnaissance☆202Updated 2 years ago
- Phishing application to aid in sending emails more simply and allowing for more control over settings.☆103Updated 8 years ago
- Search exploits in multiple exploit databases!☆85Updated 5 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆169Updated 2 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆102Updated 8 years ago
- ☆194Updated 7 years ago
- An exploitation shell focusing on exploiting command injection vulnerabilities, eg., LFI, RFI, SSTI, etc.☆175Updated 2 months ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆155Updated 10 years ago
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆167Updated 8 years ago
- PoC for an adaptive parallelised DNS prober☆108Updated 3 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆80Updated 9 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Updated 7 years ago
- Fingerprints servers, finds exploits, scans WebDAV. May or may not also make coffee.☆123Updated 6 years ago
- Snarf man-in-the-middle / relay suite☆206Updated 9 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆126Updated 6 years ago
- Tools for harvesting email addresses for phishing attacks |☆85Updated 10 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 6 years ago
- Image size issues plugin for Burp Suite☆95Updated 7 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆191Updated 6 years ago
- This is a bundle of python and bash penetration testing tools for recon and information gathering.☆80Updated 9 years ago
- Recon, Subdomain Bruting, Zone Transfers☆231Updated 9 years ago
- Shell script that runs on UNIX systems (tested on Solaris 9, HPUX 11, various Linux distributions, FreeBSD 6.2). It detects misconfigurat…☆87Updated 9 years ago
- Passive Vulnerability Auditor☆135Updated 9 years ago
- LNHG - Mass Web Fingerprinter☆63Updated 9 years ago