kh4sh3i / Shodan-Dorks
a curated list of shodan dorks for finding sensitive data in shodan.io
☆27Updated 6 months ago
Alternatives and similar repositories for Shodan-Dorks:
Users that are interested in Shodan-Dorks are comparing it to the libraries listed below
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆38Updated last year
- Python3 script to dump breach data from Dehashed☆22Updated 5 months ago
- Proof of concept denial of service over TOR stress test tool☆39Updated 6 years ago
- PHP lab to test captcha bypassing☆31Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple way☆36Updated last year
- xdebug 2.5.5 RCE exploit☆29Updated this week
- Mass Exploit for CVE 2022-29464 on Carbon☆18Updated 2 years ago
- Find Email Spoofing Vulnerablity of domains☆93Updated 5 months ago
- Leaky simplifies the management and visualization of database leak files containing credentials, enhancing efficiency in data analysis an…☆24Updated 2 weeks ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆16Updated 2 years ago
- crawl a website for links and expose all the vulnerable parameters.☆13Updated 2 years ago
- Search GitHub for public Shodan api keys☆70Updated last year
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆23Updated last year
- Updated 6000 Sql Injection Google Dork 2021☆31Updated 3 years ago
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber …☆59Updated last year
- FAST WEB APPLICATION VULNERABILITY SCANNER written in python3☆20Updated last year
- If you found this, you are among the truly lucky, to be given providence to my curated and often custom wordlists. Enjoy, buddy, you've…☆37Updated 9 months ago
- Python-based Google dork generator that creates search patterns for web reconnaissance. Combines custom patterns, site lists, and search …☆26Updated last month
- Perform With Massive Wordpress Enumeration☆11Updated last year
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆39Updated 2 months ago
- Fetch & Filter Known URLs☆14Updated 2 years ago
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆28Updated 2 years ago
- CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ]☆12Updated last year
- Simple passive Python Recon tool for subdomains enumeration with crt.sh☆18Updated 2 years ago
- Recon(Amass, Naabu, Nuclei) workflow with Github Actions☆16Updated 2 months ago
- Tool to parse Stealer Logs.☆16Updated last year
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated last year
- Ultimate Google Dork Lists OSWP top 10☆51Updated 5 months ago