Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of specific ports/IPs, etc.
☆65Aug 9, 2019Updated 6 years ago
Alternatives and similar repositories for shodan-seeker
Users that are interested in shodan-seeker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Como bastionar tu casa u oficina con una raspberry pi mediante iptables☆27Apr 13, 2023Updated 2 years ago
- Commandline utility to interact with the Malpedia service☆22Dec 5, 2025Updated 3 months ago
- Universal Honey Pot☆29Aug 27, 2025Updated 7 months ago
- CVE-2020-1048 bypass: binary planting PoC☆33Aug 20, 2020Updated 5 years ago
- nfsinkhole is a Python library and scripts for setting up a Linux server as a sinkhole (monitor, log/capture, and drop all traffic to a s…☆12Apr 8, 2017Updated 8 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- POC for CVE-2018-4327☆42Sep 13, 2018Updated 7 years ago
- Zone-H Cybercrime Archive Telegram Monitoring Bot☆14Updated this week
- Interface for the Shodan Computer Search Engine API☆27Sep 25, 2020Updated 5 years ago
- Decentralized open source slot game based on Ethereum blockchain☆14Dec 30, 2017Updated 8 years ago
- Script fingerprinting systems based on shodan.io data☆13Jul 9, 2018Updated 7 years ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆14Jan 17, 2023Updated 3 years ago
- Slides and stuffs of the meetings during the 2019☆33Jan 18, 2022Updated 4 years ago
- Tool for WPA Enterprise hacking☆17Feb 24, 2024Updated 2 years ago
- ☆20Aug 21, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- CVE-2020-12828 PoC and Analysis.☆28Jun 30, 2020Updated 5 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- PrestaShop (1.6.x <= 1.6.1.23 or 1.7.x <= 1.7.4.4) Back Office Remote Code Execution (CVE-2018-19126)☆40Dec 12, 2018Updated 7 years ago
- An active network monitor tool☆26Aug 2, 2019Updated 6 years ago
- A Red Team tool for exfiltrating sensitive data from Jira tickets.☆86Feb 21, 2023Updated 3 years ago
- Truehunter☆30May 15, 2021Updated 4 years ago
- ☆14Feb 12, 2026Updated last month
- High performance WordPress login bruteforcer with automatic concurrency for maximum amount of tries per second.☆78Feb 23, 2020Updated 6 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Oct 4, 2016Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- List of special metadata IPs used in cloud services☆11Aug 9, 2019Updated 6 years ago
- Pulse SSL VPN Arbitrary File Read burp extension☆24Sep 24, 2019Updated 6 years ago
- COVID-19 Malicious Domain Research Data☆16Jun 7, 2020Updated 5 years ago
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 6 years ago
- ffmpeg exploitation tool☆28Aug 3, 2016Updated 9 years ago
- gopclntab finder and analyzer for Radare2☆21Aug 15, 2020Updated 5 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆67Nov 27, 2018Updated 7 years ago
- File monitor for wafer maps, tester files, or about anything.☆13Aug 15, 2018Updated 7 years ago
- Data collection scripts for All Your Cloud Are Belong To Us conference talk☆29Mar 7, 2019Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆11Apr 18, 2022Updated 3 years ago
- Apache Thrift Decoder☆35Dec 7, 2017Updated 8 years ago
- Exploiting misconfigured firebase databases☆124Jun 5, 2019Updated 6 years ago
- POC exploit for SMBLost vulnerability (CVE-2020-1301)☆17Jun 13, 2020Updated 5 years ago
- Tool for test XSS vulnerabilities of a site☆18Apr 1, 2018Updated 7 years ago
- A golang CLI to setup honey pots https://en.wikipedia.org/wiki/Honeypot_(computing)☆16Jul 19, 2020Updated 5 years ago
- USB Joystick adapter for CCTV Camera Pelco-D Pan-Tilt-Zoom Over RS485☆15Feb 27, 2017Updated 9 years ago