inishantgrover / ShodmonView external linksLinks
The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided
☆33Jun 14, 2021Updated 4 years ago
Alternatives and similar repositories for Shodmon
Users that are interested in Shodmon are comparing it to the libraries listed below
Sorting:
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- ☆12Apr 21, 2019Updated 6 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆18Jul 2, 2021Updated 4 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- ☆24Sep 26, 2021Updated 4 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Aug 17, 2019Updated 6 years ago
- A simple tool to decloak/expose the bucket name behind a domain.☆22Feb 6, 2026Updated last week
- LinkedIn reconnaissance tool☆55Dec 17, 2021Updated 4 years ago
- A sub-domain enumeration tool☆20May 18, 2020Updated 5 years ago
- Practice Web App written in python with some vulnerabilities.☆34Mar 19, 2021Updated 4 years ago
- Pypykatz agent implemented in .NET☆84Mar 15, 2019Updated 6 years ago
- Unofficial WhatCMS API package☆40Mar 25, 2021Updated 4 years ago
- ☆23Jul 7, 2020Updated 5 years ago
- Discover target social media profiles☆81Sep 26, 2022Updated 3 years ago
- A Generic Windows Memory Scraping Tool☆71Apr 20, 2017Updated 8 years ago
- A cobaltstrike script that integrates DDEAuto Attacks☆63Oct 17, 2017Updated 8 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Sep 2, 2018Updated 7 years ago
- Watches for trigger packets, runs commands or spawns a shell☆26May 29, 2019Updated 6 years ago
- Apfell POC Chrome Extension Payload☆10Jun 24, 2020Updated 5 years ago
- "Useable" tool to share secrets via shamir secret sharing and NaCL.☆14Sep 19, 2018Updated 7 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- My attempts at making life with VMware that little bit easier.☆11Aug 7, 2023Updated 2 years ago
- The method and files used to generate Sysmon event logs, push them to a remote Splunk, and ingest/normalize the data for analysis.☆10Sep 28, 2020Updated 5 years ago
- Get notified instantly when your users of interest speak about something.☆10Mar 24, 2020Updated 5 years ago
- Code from this article: https://blog.rapid7.com/2018/05/03/hiding-metasploit-shellcode-to-evade-windows-defender/☆176Jul 21, 2020Updated 5 years ago
- Parse nmap's XML output files and insert them into an SQLite database☆29Jun 5, 2017Updated 8 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Dec 8, 2022Updated 3 years ago
- Real Time Threat Monitoring Tool☆114Nov 16, 2022Updated 3 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- Self-Loading Registration Free COM Functions☆11Nov 12, 2019Updated 6 years ago
- IBM System i (formerly AS400, iSeries, i5, etc.)☆11Feb 10, 2013Updated 13 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- A simple script to check for insecurely exposed git repositories.☆12Mar 17, 2019Updated 6 years ago
- ☆10Feb 18, 2016Updated 9 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Apr 20, 2018Updated 7 years ago
- Scraping creds using Github API and truffleHog☆11Dec 13, 2023Updated 2 years ago
- Random scripts for azure stuff☆13Oct 12, 2022Updated 3 years ago
- Apfell C2 Server for the Google Chrome Extension Payload☆12Aug 12, 2020Updated 5 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Jun 2, 2018Updated 7 years ago