Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of specific ports/IPs, etc.
☆65Aug 9, 2019Updated 6 years ago
Alternatives and similar repositories for shodan-seeker
Users that are interested in shodan-seeker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DNSSECChef: DNS/DNSSEC Interception Proxy☆38Mar 29, 2019Updated 7 years ago
- R package to work with the Shodan API☆18Feb 14, 2018Updated 8 years ago
- Universal Honey Pot☆29Aug 27, 2025Updated 8 months ago
- SuperNES - Super Nmap Easy Scanner☆10Oct 2, 2018Updated 7 years ago
- Dirty Cow implement in Go☆11Nov 3, 2016Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Collect information about leaks for particular domain in IntelX and present it on a tree view graph.☆30Jul 18, 2021Updated 4 years ago
- nfsinkhole is a Python library and scripts for setting up a Linux server as a sinkhole (monitor, log/capture, and drop all traffic to a s…☆12Apr 8, 2017Updated 9 years ago
- Set of extra commands for kippo, the SSH honeypot daemon☆30Nov 15, 2015Updated 10 years ago
- POC for CVE-2018-4327☆42Sep 13, 2018Updated 7 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- Reconnaissance on browser using Javascript☆30Feb 16, 2018Updated 8 years ago
- Decentralized open source slot game based on Ethereum blockchain☆14Dec 30, 2017Updated 8 years ago
- Script fingerprinting systems based on shodan.io data☆13Jul 9, 2018Updated 7 years ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆14Jan 17, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆10Nov 24, 2018Updated 7 years ago
- Scanner for public s3 buckets☆12Oct 23, 2017Updated 8 years ago
- A sub-domain enumeration tool☆20May 18, 2020Updated 5 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- ☆20Jun 2, 2016Updated 9 years ago
- Checks if the given emails have been pwned.☆15May 22, 2023Updated 2 years ago
- Truehunter☆30May 15, 2021Updated 4 years ago
- OSX Security Compliance & Hardening☆47Aug 13, 2015Updated 10 years ago
- High performance WordPress login bruteforcer with automatic concurrency for maximum amount of tries per second.☆78Feb 23, 2020Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Oct 4, 2016Updated 9 years ago
- List of special metadata IPs used in cloud services☆11Aug 9, 2019Updated 6 years ago
- SDK-SMS-Stack☆28Jan 4, 2023Updated 3 years ago
- Pulse SSL VPN Arbitrary File Read burp extension☆24Sep 24, 2019Updated 6 years ago
- COVID-19 Malicious Domain Research Data☆16Jun 7, 2020Updated 5 years ago
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 7 years ago
- ffmpeg exploitation tool☆28Aug 3, 2016Updated 9 years ago
- gopclntab finder and analyzer for Radare2☆21Aug 15, 2020Updated 5 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆67Nov 27, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- File monitor for wafer maps, tester files, or about anything.☆13Aug 15, 2018Updated 7 years ago
- Data collection scripts for All Your Cloud Are Belong To Us conference talk☆29Mar 7, 2019Updated 7 years ago
- BruteForce SSH Login Credentials much Faster...!...Bring the Thunder of Asgard to SSH☆18May 2, 2024Updated 2 years ago
- System Processes Correlation Engine☆19Jan 2, 2024Updated 2 years ago
- POC exploit for SMBLost vulnerability (CVE-2020-1301)☆17Jun 13, 2020Updated 5 years ago
- Tool for test XSS vulnerabilities of a site☆18Apr 1, 2018Updated 8 years ago
- A golang CLI to setup honey pots https://en.wikipedia.org/wiki/Honeypot_(computing)☆16Jul 19, 2020Updated 5 years ago