kh4sh3i / Shodan-Dorks
a curated list of shodan dorks for finding sensitive data in shodan.io
☆27Updated 7 months ago
Alternatives and similar repositories for Shodan-Dorks:
Users that are interested in Shodan-Dorks are comparing it to the libraries listed below
- xdebug 2.5.5 RCE exploit☆30Updated last month
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆28Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple way☆37Updated last year
- Fetch & Filter Known URLs☆15Updated 2 years ago
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆38Updated last year
- Python3 script to dump breach data from Dehashed☆24Updated 6 months ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆37Updated 2 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆16Updated 2 years ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆42Updated 3 months ago
- IP-Finder is an Open Source Intelligence (OSINT) tool that helps collect IPs of Companies, Servers, Operating Systems and much more. It a…☆11Updated 2 years ago
- 「🧱」Test a list of payloads and see if you can bypass it☆55Updated 2 years ago
- Find Email Spoofing Vulnerablity of domains☆93Updated 6 months ago
- Leakix Searcher☆12Updated 3 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆34Updated last year
- This tool will help in generating reverse shells easily for all types of OS.☆19Updated last year
- Perform With Massive Wordpress Enumeration☆12Updated last year
- proxychains is a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, …☆30Updated last year
- PHP lab to test captcha bypassing☆32Updated last year
- Tool to parse Stealer Logs.☆16Updated last year
- Top password lists generated from leaks collected from different paste sites☆30Updated 2 years ago
- Proof of concept denial of service over TOR stress test tool☆40Updated 6 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated 2 years ago
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber …☆61Updated last year
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆17Updated last year
- RedTeam - Red Team Tools☆41Updated 2 years ago
- Classic Web shell upload techniques & Web RCE techniques☆27Updated 3 months ago
- A Simple Script For SSH BruteForce☆37Updated last year
- Scrape Pastebin API to collect daily pastes, setup a wordlist and be alerted by email when you have a match.☆48Updated 2 weeks ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆21Updated last week