markclayton / csreconLinks
Open source tool that uses censys and shodan for passive recon.
☆13Updated 9 years ago
Alternatives and similar repositories for csrecon
Users that are interested in csrecon are comparing it to the libraries listed below
Sorting:
- McAfee ePolicy 0wner exploit code☆46Updated 7 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Updated last year
- Lair Framework dockerized.☆38Updated 4 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Updated 10 years ago
- A tool to catch spoofed NBNS responses.☆51Updated 7 years ago
- Recursively searches a directory for any file containing a specified string☆48Updated 10 years ago
- Make Windows LNK file with python (pylnk)☆66Updated 9 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆25Updated last year
- Comprehensive Pivoting Framework☆20Updated 9 years ago
- A set of compiled application restriction bypasses☆30Updated 8 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆66Updated 10 years ago
- Projects and POCs☆61Updated 11 years ago
- Things I've coded, or use (cause I can't find them online anymore)☆32Updated 13 years ago
- ☆25Updated 9 years ago
- Search the ExploitDB with a little more control☆22Updated 8 years ago
- ☆46Updated 8 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Updated 10 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Updated 12 years ago
- Tool for analysts to perform simultaneous lookups (IP, Domain, URL, MD5) against multiple data sources☆29Updated 9 years ago
- dnmap revised (dnmapR) is a modernized and enhanced version of dnmap☆34Updated 7 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- ☆17Updated 11 years ago
- Capture passwords of login attempts on non-existent and disabled accounts.☆38Updated 3 years ago
- ☆61Updated 7 years ago
- Checkpoint Firewall Ruleset Auditor ( For the HTML exports when you do not have the object files )☆39Updated 8 years ago
- Next Generation of White Chapel☆21Updated 11 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- Yara intergrated into BurpSuite☆48Updated 9 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 6 years ago
- Scan web server for known webshell names and responses☆50Updated 9 years ago