Here are the most interesting Shodan dorks (according to me)
☆104Dec 10, 2023Updated 2 years ago
Alternatives and similar repositories for shodan-dorks
Users that are interested in shodan-dorks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Shodan Dorks☆557Mar 31, 2023Updated 2 years ago
- Dorks for shodan.io. Some basic shodan dorks collected from publicly available data.☆526May 26, 2020Updated 5 years ago
- Monitor your study sessions, log your study hours, set goals, and watch your productivity progress.☆10May 19, 2024Updated last year
- Hikvision Backdoor using Shodan. Python file that scans IP's from Shodan.☆29Jan 11, 2024Updated 2 years ago
- Simple Automation script for juniper cve-2023-36845☆19Jan 30, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- Red Team Projects with chat.openai.com.☆17Apr 3, 2023Updated 2 years ago
- Shodan Dorks 2023☆245Jan 13, 2025Updated last year
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- Exploit to bypass Xiongmai surveillance camera authentication mechanism☆32Oct 7, 2025Updated 5 months ago
- An auto-updating list of shodan dorks with info on the amount of results they return!☆333Mar 21, 2026Updated last week
- Shodan Dorks☆502Mar 12, 2026Updated 2 weeks ago
- Wing FTP Server Remote Code Execution (RCE) Exploit (CVE-2025-47812)☆51Jul 14, 2025Updated 8 months ago
- Speed-up your hunting with google dorks🚀🚀☆21Sep 8, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- IoT Hacking Kit Details☆19Aug 19, 2025Updated 7 months ago
- Mass bruteforce authentication of common services with common credentials.☆54Dec 2, 2023Updated 2 years ago
- 🛠️ In this repository you will find all the OSCP tools I created and used during the course. 🛠️☆13Dec 23, 2023Updated 2 years ago
- Follina (CVE-2022-30190) is a Microsoft Office zero-day vulnerability that has recently been discovered. It’s a high-severity vulnerabili…☆12May 14, 2023Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- Quick test for CVE-2023-26025 behaviours☆13Nov 29, 2023Updated 2 years ago
- Mind map for certifcation, vulnerability finding and recon for bug bounty and professional works.☆19Mar 17, 2024Updated 2 years ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆32Jun 2, 2024Updated last year
- Garudaastra Tool is based on python3 to find cameras around the world☆28Jun 29, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- Nuclei Templates Directory☆57Mar 17, 2026Updated last week
- A PoC exploit for CVE-2023-51467 - Apache OFBiz Authentication Bypass☆12Dec 31, 2023Updated 2 years ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Jan 28, 2024Updated 2 years ago
- Privilege escalation using the XAML diagnostics API (CVE-2023-36003)☆94Jan 11, 2024Updated 2 years ago
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆30Feb 9, 2024Updated 2 years ago
- CVE-2023-43261 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption☆57Oct 1, 2023Updated 2 years ago
- F5 BIG-IP unauthenticated remote code execution (RCE) and authentication bypass vulnerability!☆11Oct 30, 2023Updated 2 years ago
- CVE-2023-6063 (WP Fastest Cache < 1.2.2 - UnAuth SQL Injection)☆29Nov 15, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆13Apr 14, 2024Updated last year
- A ruby wrapper for CoreLocation☆29Aug 7, 2012Updated 13 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- Use Wg Gen Web to manage Kilo peers☆10Apr 7, 2021Updated 4 years ago
- Kentico <=12.0.14 is vulnerable to a remote code execution via the SyncServer☆10Sep 28, 2020Updated 5 years ago
- Subdomain Takeover lab is FREE for everyone. This means here is a legal to takeover Subdomain of this website. Here you'll find more tha…☆24Jan 1, 2025Updated last year
- The objective of Smart File Hunter (SFH) is the efficient identification of files containing sensitive information like passwords or priv…☆14Sep 3, 2022Updated 3 years ago