Censys.io Python API Search
☆43May 3, 2017Updated 8 years ago
Alternatives and similar repositories for censys
Users that are interested in censys are comparing it to the libraries listed below
Sorting:
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- Create Suricata and Snort DNS signatures given a single domain or list of domains in a file.☆18Nov 13, 2017Updated 8 years ago
- Quick and dirty python script to generate mutual SSL certificates and configuration files to quickly configure OpenVPN☆19Apr 20, 2016Updated 9 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Small modification version of p0wnedShell☆40Apr 25, 2016Updated 9 years ago
- Query Shodan and Censys data for fast parsing☆39Aug 7, 2018Updated 7 years ago
- An in-development fork of the Riverloopsec Killerbee Project with additional tools / bugfixes☆11Jan 16, 2018Updated 8 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- Parallel APK analyzer☆51Jan 10, 2017Updated 9 years ago
- WAF Cookie Fetcher is a Burp Suite extension written in Python, which uses a headless browser to obtain the values of WAF-injected cookie…☆16Jan 16, 2018Updated 8 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Zone transfer a domain from its own NS servers and bruteforce subdomains☆12Mar 8, 2025Updated 11 months ago
- Parses Nmap XML files☆25Apr 29, 2015Updated 10 years ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- A composite score for one's GitHub quality.☆22May 1, 2022Updated 3 years ago
- Suite for Information gathering☆12Jul 2, 2018Updated 7 years ago
- python tools to assist in penetration testing☆14Jan 19, 2026Updated last month
- Cowrie Honeypot Obscurer☆17Oct 14, 2020Updated 5 years ago
- Lite version of PDF X-RAY that uses no backend☆38Nov 11, 2011Updated 14 years ago
- Modules created by Nettitude for Metasploit☆12Jun 20, 2018Updated 7 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 12 years ago
- ☆13Nov 1, 2017Updated 8 years ago
- The documents☆56Nov 2, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/fuzzdb☆14Jun 23, 2015Updated 10 years ago
- ☆58Jul 16, 2017Updated 8 years ago
- Software exploitation training material☆16Jun 8, 2017Updated 8 years ago
- A tool to generate yara signatures from function blocks☆19Dec 8, 2014Updated 11 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆37Mar 24, 2014Updated 11 years ago
- Custom Maltego transforms☆67Feb 27, 2015Updated 11 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Apr 6, 2024Updated last year
- Sorta reverse implementation of ShoVAT - Also includes NMAP banner regex results☆16Dec 28, 2018Updated 7 years ago
- ☆14Jun 26, 2020Updated 5 years ago
- ☆17Sep 14, 2017Updated 8 years ago
- ☆15Feb 22, 2021Updated 5 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 9 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆66Dec 21, 2015Updated 10 years ago
- This repo contains Axis web shells☆18Jun 15, 2019Updated 6 years ago