kh4sh3i / Shodan-Dorks
a curated list of shodan dorks for finding sensitive data in shodan.io
☆27Updated 8 months ago
Alternatives and similar repositories for Shodan-Dorks:
Users that are interested in Shodan-Dorks are comparing it to the libraries listed below
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆39Updated last year
- xdebug 2.5.5 RCE exploit☆30Updated 2 months ago
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆28Updated 2 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated last year
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆22Updated last year
- Perform With Massive Wordpress Enumeration☆11Updated last year
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆38Updated 6 months ago
- Rockyou for web fuzzing☆14Updated 3 years ago
- A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticat…☆8Updated 10 months ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Python3 script to dump breach data from Dehashed☆27Updated 8 months ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆40Updated 4 months ago
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆15Updated 3 years ago
- ☆13Updated last week
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆21Updated 2 years ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆49Updated last year
- DNSrecon tool with GUI for Kali Linux☆57Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- i will upload all the books that helped me in learning in this repo☆20Updated 2 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated 2 years ago
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆17Updated last year
- This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, i…☆11Updated 4 years ago
- Social Engineering Browser Update Attack.☆56Updated last year
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆16Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- IP-Finder is an Open Source Intelligence (OSINT) tool that helps collect IPs of Companies, Servers, Operating Systems and much more. It a…☆11Updated 2 years ago
- Fetch & Filter Known URLs☆15Updated 2 years ago
- Simple passive Python Recon tool for subdomains enumeration with crt.sh☆19Updated 2 years ago
- A small and efficient tool to find open redirect vulnerabilities.☆16Updated 3 years ago
- Simple Tool for webhacking☆11Updated last year