Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of specific ports/IPs, etc.
☆65Aug 9, 2019Updated 6 years ago
Alternatives and similar repositories for shodan-seeker
Users that are interested in shodan-seeker are comparing it to the libraries listed below
Sorting:
- Slides and stuffs of the meetings during the 2019☆33Jan 18, 2022Updated 4 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- POC for CVE-2018-4327☆42Sep 13, 2018Updated 7 years ago
- OSX Security Compliance & Hardening☆47Aug 13, 2015Updated 10 years ago
- SuperNES - Super Nmap Easy Scanner☆10Oct 2, 2018Updated 7 years ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆14Jan 17, 2023Updated 3 years ago
- Decentralized open source slot game based on Ethereum blockchain☆14Dec 30, 2017Updated 8 years ago
- Reverse shell container for k8s deployments☆49Feb 21, 2020Updated 6 years ago
- Pulse SSL VPN Arbitrary File Read burp extension☆24Sep 24, 2019Updated 6 years ago
- LFI/RFI scanner by Iman Karim (fimap.dev@gmail.com)☆10Jul 3, 2015Updated 10 years ago
- Scanner for public s3 buckets☆12Oct 23, 2017Updated 8 years ago
- Script fingerprinting systems based on shodan.io data☆13Jul 9, 2018Updated 7 years ago
- List of special metadata IPs used in cloud services☆11Aug 9, 2019Updated 6 years ago
- Dirty Cow implement in Go☆11Nov 3, 2016Updated 9 years ago
- English subtitles for the TV series "Hackad"☆11May 18, 2023Updated 2 years ago
- Universal Honey Pot☆29Aug 27, 2025Updated 6 months ago
- ffmpeg exploitation tool☆27Aug 3, 2016Updated 9 years ago
- High performance WordPress login bruteforcer with automatic concurrency for maximum amount of tries per second.☆78Feb 23, 2020Updated 6 years ago
- ☆14Jul 8, 2019Updated 6 years ago
- Checks if the given emails have been pwned.☆15May 22, 2023Updated 2 years ago
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 6 years ago
- CVE-2020-1048 bypass: binary planting PoC☆33Aug 20, 2020Updated 5 years ago
- Exploiting misconfigured firebase databases☆123Jun 5, 2019Updated 6 years ago
- ☆31Feb 10, 2020Updated 6 years ago
- Apache Thrift Decoder☆35Dec 7, 2017Updated 8 years ago
- Truehunter☆30May 15, 2021Updated 4 years ago
- A scanner of the "World's Scariest" scanner☆17Dec 7, 2022Updated 3 years ago
- DNSSECChef: DNS/DNSSEC Interception Proxy☆37Mar 29, 2019Updated 6 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Aug 13, 2018Updated 7 years ago
- Herramienta para Windows que permite automatizar tareas de Footprint y Fingerprint en un Test de Intrusión☆15Jan 1, 2018Updated 8 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- Security cheat sheets for different language and platforms☆18Dec 31, 2023Updated 2 years ago
- Password Lists for penetration testing, sorted by language.☆13Nov 23, 2017Updated 8 years ago
- A repository for my conference presentations☆35Feb 18, 2020Updated 6 years ago
- Java code for CFS2160 Programming Stream 2019/20☆10Jan 16, 2020Updated 6 years ago
- Tool to automate the whole process of environment in android audits☆14Apr 30, 2019Updated 6 years ago
- Collection of scripts & fingerprinting tricks for Shodan.io☆259Jul 8, 2020Updated 5 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Aug 5, 2022Updated 3 years ago
- ☆37Jun 7, 2019Updated 6 years ago