Open source tool that uses censys and shodan for passive recon.
☆13May 20, 2016Updated 9 years ago
Alternatives and similar repositories for csrecon
Users that are interested in csrecon are comparing it to the libraries listed below
Sorting:
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 11 years ago
- Minion Frontend☆30Mar 28, 2019Updated 6 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆22Jun 3, 2014Updated 11 years ago
- Pentesting Tools☆22Sep 15, 2025Updated 5 months ago
- INACTIVE - http://mzl.la/ghe-archive - Minion Backend☆40Mar 28, 2019Updated 6 years ago
- Php Codz Hacking☆21Sep 5, 2015Updated 10 years ago
- A network data locater using credentials obtained during penetration tests☆32Oct 30, 2013Updated 12 years ago
- Encoder, Decoder, Converter, Calculator, TU WAS DU WILLST .. for various codings used in the wild wide web☆41Jul 3, 2024Updated last year
- Sends Sentry notifications to Mattermost Open Source Chat☆10Jan 10, 2023Updated 3 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆42Oct 15, 2022Updated 3 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Feb 26, 2016Updated 10 years ago
- A Repository for Miscellaneous Scripts☆11Jul 18, 2014Updated 11 years ago
- Generate a Bitcoin paper wallet offline as a png file, no need for a browser.☆23Mar 27, 2017Updated 8 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Get Group Policy information from ADMX files.☆11Jan 22, 2021Updated 5 years ago
- Set of handy and useful tools by Elive, for specially use in the Elive project☆15Feb 25, 2026Updated last week
- Small helper program for monitor layouts.☆10Nov 9, 2016Updated 9 years ago
- gnu radio files☆12Oct 6, 2015Updated 10 years ago
- This repository contains the technique presented at SOCON2025 for stealing cookies silently from MacOS Sequoia with only root privileges☆12Mar 27, 2025Updated 11 months ago
- dati extra☆14Nov 5, 2023Updated 2 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- A tool for deploying and testing network routers in the cloud.☆10Sep 23, 2021Updated 4 years ago
- ActiveMQ Deserialization RCE☆15Aug 30, 2019Updated 6 years ago
- ☆14Oct 4, 2021Updated 4 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- A tool to leverage Virus Total's API key with advanced queries to download malware(s) and report(s).☆11Apr 24, 2013Updated 12 years ago
- Simple terminal interface for chatgpt☆10Dec 6, 2022Updated 3 years ago
- EasyCTF Writeups☆13Jan 10, 2015Updated 11 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆11Mar 22, 2021Updated 4 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Project examples☆12Feb 15, 2016Updated 10 years ago
- Apfell POC Chrome Extension Payload☆10Jun 24, 2020Updated 5 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 3 years ago
- Uptime checker for tor hidden services☆12Feb 14, 2018Updated 8 years ago
- Account Details plugin for Roundcube☆10Dec 20, 2025Updated 2 months ago
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆11Jan 10, 2017Updated 9 years ago