The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided
☆33Jun 14, 2021Updated 4 years ago
Alternatives and similar repositories for Shodmon
Users that are interested in Shodmon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- Apfell POC Chrome Extension Payload☆10Jun 24, 2020Updated 5 years ago
- A sub-domain enumeration tool☆20May 18, 2020Updated 5 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Aug 17, 2019Updated 6 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Detect and alert when Rogue AP and Deauth attacks occur☆14May 16, 2019Updated 6 years ago
- Practice Web App written in python with some vulnerabilities.☆34Mar 19, 2021Updated 5 years ago
- Apfell C2 Server for the Google Chrome Extension Payload☆12Aug 12, 2020Updated 5 years ago
- LinkedIn reconnaissance tool☆54Dec 17, 2021Updated 4 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆24Sep 2, 2018Updated 7 years ago
- ☆12Apr 21, 2019Updated 7 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28May 8, 2019Updated 7 years ago
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆14Aug 9, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Apr 4, 2018Updated 8 years ago
- WaybackRust is a tool written in Rust to query the WaybackMachine.☆15Jul 18, 2025Updated 9 months ago
- A simple tool to decloak/expose the bucket name behind a domain.☆25Mar 20, 2026Updated last month
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆26Aug 21, 2023Updated 2 years ago
- ☆24Sep 26, 2021Updated 4 years ago
- Gathers current reported online malicious websites and grabs the content for offline analyzing☆14Mar 9, 2019Updated 7 years ago
- Collect information about email addresses from Pastebin☆39Jun 1, 2021Updated 4 years ago
- Code from this article: https://blog.rapid7.com/2018/05/03/hiding-metasploit-shellcode-to-evade-windows-defender/☆177Jul 21, 2020Updated 5 years ago
- Watches for trigger packets, runs commands or spawns a shell☆26May 29, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆61Jun 2, 2018Updated 7 years ago
- proxyd proxies data between TCP, TLS, and unix sockets☆22May 11, 2017Updated 8 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆325Mar 26, 2019Updated 7 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- Unofficial WhatCMS API package☆40Mar 25, 2021Updated 5 years ago
- A simple bash script to scan common networks with ARP requests to steal a found internal IP address, if DHCP does not automatically assig…☆12Sep 4, 2019Updated 6 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆109Nov 19, 2020Updated 5 years ago
- Find endpoints in archived versions of robots.txt☆14Nov 21, 2019Updated 6 years ago
- Scraping creds using Github API and truffleHog☆11Dec 13, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Ps1jacker is a tool for generating COM Hijacking payload.☆60Feb 11, 2025Updated last year
- ☆29Aug 10, 2019Updated 6 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Feb 26, 2016Updated 10 years ago
- ☆23Jul 7, 2020Updated 5 years ago
- A cobaltstrike script that integrates DDEAuto Attacks☆63Oct 17, 2017Updated 8 years ago
- SubR3con is a script written in python. It uses Sublist3r to enumerate all subdomains of a specific target and then it checks for status …☆18Jul 23, 2019Updated 6 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Dec 8, 2022Updated 3 years ago