markclayton / csrecon
Open source tool that uses censys and shodan for passive recon.
☆13Updated 8 years ago
Alternatives and similar repositories for csrecon:
Users that are interested in csrecon are comparing it to the libraries listed below
- Squirtle the Browser-based NTLM Attack Toolkit☆18Updated 9 years ago
- Lair Framework dockerized.☆38Updated 3 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- Search the ExploitDB with a little more control☆21Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 5 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- ☆17Updated 10 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Updated 8 months ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- Efficient clustering of MASSCAN results☆12Updated 8 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- Recursively searches a directory for any file containing a specified string☆45Updated 9 years ago
- Flash crossdomain policy security checker☆25Updated 9 years ago
- Anti-Honeypot Demo (obsolete)☆18Updated 7 years ago
- Nashorn Post Exploitation☆32Updated 7 years ago
- A collection of scripts made duing my personal research☆28Updated 6 years ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago
- A script to automate Jenkins credential store decryption☆17Updated 6 years ago
- Social Engineering Abusing Google App Scripts☆24Updated 8 years ago
- Mattermost - Shodan Slash command☆31Updated 8 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆39Updated 5 years ago
- Simple web app for displaying cowrie data in your browser☆12Updated 8 years ago
- Office 365 MFA capture toolkit☆12Updated 7 years ago
- Uses InstallUtil.exe to load a compatible executable from a network share.☆12Updated 9 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- ☆25Updated 8 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- Detect malicious domain, Blablablablabla☆26Updated 8 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago