jesusprubio / shodan-clientLinks
Node.js/JavaScript Library for accessing the new Shodan API
☆208Updated 5 years ago
Alternatives and similar repositories for shodan-client
Users that are interested in shodan-client are comparing it to the libraries listed below
Sorting:
- Javascript library for connecting to the CertStream network.☆63Updated 4 years ago
- A command-line tool for querying the 'Have I been pwned?' service.☆238Updated this week
- A collection of exploits for different VoIP products.☆261Updated 2 months ago
- NodeJS Simple Network Scanner☆546Updated 3 years ago
- Kick devices off your network by performing an ARP Spoof attack with Node.js.☆286Updated 2 years ago
- scans network for hosts and open ports☆31Updated 8 years ago
- Pown.js is a security testing an exploitation toolkit built on top of Node.js and NPM.☆261Updated 2 years ago
- NPM package for interfacing with local NMAP installation☆68Updated 2 years ago
- RegEx Denial of Service (ReDos) Scanner☆178Updated 7 years ago
- VirusTotal API for Node JS☆50Updated 2 years ago
- Send ARP packets and read ARP tables using Javascript☆83Updated 4 years ago
- An unofficial TypeScript SDK for the 'Have I been pwned?' service.☆118Updated this week
- MalQR is a collection of malicious QR Codes and Barcodes you can use to test the security of your scanners.☆124Updated last year
- Netcat client and server modules written in pure Javascript for Node.js.☆436Updated 3 years ago
- Quickjack is a point-and-click tool for intuitively producing advanced clickjacking and frame slicing attacks.☆242Updated 2 years ago
- Fake sshd that logs ip addresses, usernames, and passwords.☆198Updated 8 years ago
- Fast, Elegant subdomain scanner using nodejs☆33Updated 6 years ago
- Crack MD5 passwords with JavaScript Web Workers☆386Updated 7 years ago
- Paskto - Passive Web Scanner☆151Updated 6 years ago
- 🔓Crack hashes using online rainbow & lookup table attack services, right from your terminal.☆234Updated 2 years ago
- API to access nmap from node.js☆258Updated 3 years ago
- Demo of phishing attack on the native HTML5 full screen API.☆117Updated 12 years ago
- Take full control of a OSX user or root account via command line.☆99Updated 7 years ago
- ☆120Updated 6 years ago
- Perform advanced MiTM attacks on websites with ease 💉☆680Updated last year
- Information gathering & website reconnaissance | https://phishstats.info/☆453Updated 6 years ago
- Passive Vulnerability Auditor☆135Updated 9 years ago
- Hunt for vulnerable websites as you browse.☆132Updated 8 years ago
- Command-line Google dork tool. This is an early predecessor to dorkbot, which may be more useful: https://github.com/utiso/dorkbot☆150Updated 8 years ago
- A framework for identifying and launching exploits against internal network hosts. Works via WebRTC IP enumeration combined with WebSocke…☆551Updated 9 years ago