kh4sh3i / Shodan-Dorks
a curated list of shodan dorks for finding sensitive data in shodan.io
☆26Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for Shodan-Dorks
- Proof of concept denial of service over TOR stress test tool☆35Updated 6 years ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆37Updated last week
- xdebug 2.5.5 RCE exploit☆30Updated 2 years ago
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆38Updated last year
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆16Updated 2 years ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆35Updated last year
- Perform With Massive Wordpress Enumeration☆10Updated last year
- Bash Script to automate the process of setting up a new Kali Linux virtual machine to look a like HTB PwnBox☆13Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆54Updated 2 years ago
- The Network Execution Tool☆13Updated 7 months ago
- Generate Undetectable Metasploit Payload in a simple way☆36Updated 11 months ago
- PHP lab to test captcha bypassing☆31Updated 10 months ago
- Scrape Pastebin API to collect daily pastes, setup a wordlist and be alerted by email when you have a match.☆48Updated last year
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆28Updated 2 years ago
- Simple Tool for webhacking☆10Updated last year
- 🤖 The Modern Port Scanner 🤖☆15Updated 3 years ago
- Social Engineering Browser Update Attack.☆54Updated last year
- Ultimate Google Dork Lists OSWP top 10☆49Updated 3 months ago
- A Simple Script For SSH BruteForce☆34Updated last year
- Search GitHub for public Shodan api keys☆68Updated last year
- Generate FUD Droppers that are undetectable by popular AV's☆32Updated last year
- Tool to parse Stealer Logs.☆15Updated last year
- my own 2fa bypass methodolgy☆22Updated last year
- This tool will help in generating reverse shells easily for all types of OS.☆19Updated last year
- Enumeration & fingerprint tool☆23Updated 8 months ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆37Updated 2 years ago
- Tool for bypassing logins vulnerable against SQL injection☆45Updated 7 months ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated last year