lothos612 / shodanLinks
Shodan Dorks
☆540Updated 2 years ago
Alternatives and similar repositories for shodan
Users that are interested in shodan are comparing it to the libraries listed below
Sorting:
- Dorks for shodan.io. Some basic shodan dorks collected from publicly available data.☆512Updated 5 years ago
- ☆416Updated 4 years ago
- Shodan Dorks☆485Updated 11 months ago
- A Powerful Sensor Tool to discover login panels, and POST Form SQLi Scanning☆524Updated 2 years ago
- Simple Google Dorks search tool☆316Updated 5 months ago
- ⡷⠂𝚔𝚊𝚛𝚖𝚊 𝚟𝟸⠐⢾ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)☆931Updated 8 months ago
- Here are the most interesting Shodan dorks (according to me)☆102Updated 2 years ago
- Weaponizing WaybackUrls for Recon, BugBounties , OSINT, Sensitive Endpoints and what not☆513Updated 2 months ago
- An auto-updating list of shodan dorks with info on the amount of results they return!☆320Updated this week
- Bug Bounty Tools used on Twitch - Recon☆321Updated last year
- Ashok is a OSINT Recon Tool , a.k.a Swiss Army knife .☆350Updated 4 years ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆258Updated 10 months ago
- Automated Recon for Pentesting & Bug Bounty☆433Updated 3 months ago
- checklist for testing the web applications☆286Updated 2 years ago
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆299Updated 2 years ago
- A command-line utility designed to discover URLs for a given domain in a simple, efficient way. It works by gathering information from a …☆674Updated 2 months ago
- Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together.☆571Updated last month
- MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilitie…☆1,022Updated last year
- Dome - Subdomain Enumeration Tool. Fast and reliable python script that makes active and/or passive scan to obtain subdomains and search …☆540Updated 2 years ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆379Updated 2 years ago
- Arsenal is a Simple shell script (Bash) used to install tools and requirements for Bug Bounty☆284Updated last year
- ☆440Updated 3 years ago
- Usefull telegram for data leaks, tutorials, free course.☆113Updated last year
- How to search on the shodan.io website☆119Updated 5 years ago
- Pentesting automation platform that combines hacking tools to complete assessments☆520Updated last week
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆258Updated 7 months ago
- ShodanX is a tool to gather information of targets using shodan dorks⚡.☆480Updated 8 months ago
- Work in progress...☆529Updated last year
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker …☆284Updated 11 months ago
- List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.☆417Updated last year