Python script to parse JSON data exported from SHODAN nad create IP:PORT list to use with other tools
☆25Nov 1, 2017Updated 8 years ago
Alternatives and similar repositories for shodan-parser
Users that are interested in shodan-parser are comparing it to the libraries listed below
Sorting:
- ☆10Sep 3, 2021Updated 4 years ago
- Companion Worm research☆16Nov 8, 2021Updated 4 years ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- Babuk v2☆11Sep 28, 2021Updated 4 years ago
- Post-Auth RCE & Persistence on UOKOO Security Cameras☆12Nov 17, 2020Updated 5 years ago
- A small and fast bash script to automate LFI vulnerability.☆11Nov 21, 2022Updated 3 years ago
- A SMTP Checker / SMTP Cracker with SOCKS support and e-mail delivery test (inbox check) for mailpass combolists.☆16Jan 16, 2022Updated 4 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 5 years ago
- Automates searching Shodan for vulnerable systems in your neighborhood.☆12Jul 16, 2020Updated 5 years ago
- Bulk hostname lookup using shodan☆14Jun 1, 2022Updated 3 years ago
- CVE-2021-22005批量验证python脚本☆13Sep 25, 2021Updated 4 years ago
- Mass Hunting & Exploitation PoC for CVE-2025-55182 & CVE-2025-66478☆38Dec 7, 2025Updated 2 months ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 3 years ago
- CVE-2022-22963 Spring-Cloud-Function-SpEL_RCE_exploit☆15Mar 30, 2022Updated 3 years ago
- jsc decrypt tool☆15Jul 17, 2020Updated 5 years ago
- ☆16Sep 9, 2021Updated 4 years ago
- Information Repository on Various Methods of getting shell access into a Windows machine☆17Feb 11, 2020Updated 6 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Dec 30, 2023Updated 2 years ago
- bash script to enumerate vulnerabilities on specific year through Shodan API☆46Dec 5, 2018Updated 7 years ago
- Combined PowerShell and CMD Reverse Shell☆13Oct 31, 2019Updated 6 years ago
- Scans the typos of candidate election pages for typosquatters☆18Oct 25, 2018Updated 7 years ago
- A minimalistic android backdoor☆19Aug 1, 2020Updated 5 years ago
- cobaltstrike4.5版本破解、去除checksum8特征、bypass BeaconEye、修复错误路径泄漏stage、增加totp双因子验证、修复CVE-2022-39197等☆18Sep 26, 2022Updated 3 years ago
- Load the evilDLL from socket connection without touch disk☆15Aug 27, 2021Updated 4 years ago
- 在科研(摸鱼)过程中,收集到的或者自己写的一些有用的(经过实战检验的)exp/poc,欢迎提交issue和PR☆15Oct 15, 2021Updated 4 years ago
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- the metasploit script(POC/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerability☆22Oct 2, 2021Updated 4 years ago
- ☆21Oct 3, 2021Updated 4 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 4 years ago
- ☆17May 18, 2022Updated 3 years ago
- Enable RDP and set firewall by Windows API.☆21Mar 3, 2022Updated 4 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- jgraphx 4.0.4 build for cs project☆22Oct 23, 2020Updated 5 years ago
- Burp extension to use updated token values, such as a bearer token☆24Dec 2, 2022Updated 3 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Aug 6, 2018Updated 7 years ago
- The Fastest way to consume Threat Intel☆26Apr 30, 2022Updated 3 years ago
- Set your VPS with docker for multiple websites☆16Jul 12, 2016Updated 9 years ago
- Another AMSI bypass - but in C++.☆25May 22, 2023Updated 2 years ago
- Botnet targeting Windows machines 🐍☆46Updated this week