jakejarvis / awesome-shodan-queriesLinks
π A collection of interesting, funny, and depressing search queries to plug into shodan.io π©βπ»
β6,579Updated last year
Alternatives and similar repositories for awesome-shodan-queries
Users that are interested in awesome-shodan-queries are comparing it to the libraries listed below
Sorting:
- List of Awesome Red Teaming Resourcesβ7,411Updated last year
- Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheetβ5,192Updated 7 months ago
- Attack Surface Management Platformβ8,938Updated 2 months ago
- Collection of the cheat sheets useful for pentestingβ4,103Updated last year
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.β9,715Updated 2 weeks ago
- A Workflow Engine for Offensive Securityβ5,722Updated 2 months ago
- Official Black Hat Arsenal Security Tools Repositoryβ4,113Updated 11 months ago
- List of Awesome Asset Discovery Resourcesβ2,180Updated 6 months ago
- "Can I take over XYZ?" β a list of services and how to claim (sub)domains with dangling DNS records.β5,289Updated 6 months ago
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounβ¦β9,042Updated last week
- π‘οΈ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.β4,822Updated last year
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.β5,629Updated 2 months ago
- A high performance offensive security tool for reconnaissance and vulnerability scanningβ3,215Updated 2 months ago
- E-mails, subdomains and names Harvester - OSINTβ13,148Updated last week
- In-depth attack surface mapping and asset discoveryβ13,401Updated last week
- π₯ Web-application firewalls (WAFs) from security standpoint.β6,812Updated 9 months ago
- Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.β4,891Updated 9 months ago
- A list of interesting payloads, tips and tricks for bug bounty hunters.β6,216Updated last year
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systemsβ11,950Updated 9 months ago
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Sβ¦β2,756Updated 2 years ago
- βοΈ A curated list of awesome forensic analysis tools and resourcesβ4,492Updated 2 months ago
- A curated list of Awesome Threat Intelligence resourcesβ9,086Updated 2 months ago
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mandβ¦β7,302Updated 10 months ago
- All In One Web Reconβ2,502Updated 3 months ago
- βοΈ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntingβ4,121Updated last month
- A curated list of amazingly awesome Burp Extensionsβ3,254Updated 5 months ago
- articlesβ13,269Updated 2 years ago
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.β3,459Updated 2 years ago
- A Tool for Domain Flyoversβ5,823Updated 3 years ago
- β2,287Updated last year