ninoseki / shodan-dojoLinks
Learning Shodan through katas
☆465Updated 4 years ago
Alternatives and similar repositories for shodan-dojo
Users that are interested in shodan-dojo are comparing it to the libraries listed below
Sorting:
- TotalRecon installs all the recon tools you need☆464Updated 4 years ago
- This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a …☆478Updated 5 years ago
- An open source intelligence tool to crawl the graph of certificate Alternate Names☆353Updated last year
- Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.☆717Updated this week
- An ongoing list of virtual cybersecurity conferences.☆120Updated 4 years ago
- A query aggregator for OSINT based threat hunting☆899Updated this week
- Pastebin OSINT Harvester☆323Updated 6 years ago
- This repo contains logstash of various honeypots☆174Updated 5 years ago
- Attack Surface Management since before Attack Surface Management was a thing☆645Updated 2 weeks ago
- A passive subdomain finder☆330Updated 2 years ago
- A list of shodan filters☆566Updated 6 years ago
- Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more a…☆372Updated 4 years ago
- A modular OSINT honeypot for blue teamers☆335Updated 2 years ago
- AI-based, context-driven network device ranking☆296Updated last year
- hardCIDR is a Linux Bash script, but also functions under macOS. Your mileage may vary on other distros. The script with no specified opt…☆370Updated 3 years ago
- Course content, lab setup instructions and documentation of our very popular Breaking and Pwning Apps and Servers on AWS and Azure hands …☆939Updated 2 years ago
- A tool designed to hunt for Phishing Kit source code☆222Updated 2 years ago
- The Web Application Hacker's Handbook - Extra Content☆552Updated 2 years ago
- Scanning pastebin with yara rules☆1,092Updated this week
- DNS covert channel implant for Red Teams.☆733Updated 5 years ago
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆283Updated last year
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.☆521Updated 2 years ago
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆634Updated 4 years ago
- Password spraying using AWS Lambda for IP rotation☆627Updated 2 years ago
- Proofs of Concept. Just fucking around.☆193Updated 2 years ago
- Harden your Chrome browser via enterprise policy.☆290Updated 2 years ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆699Updated 9 months ago
- Collection of pentesting scripts☆435Updated 3 years ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆752Updated 9 months ago
- Extract and Visualize Data from URLs using Unfurl☆676Updated last month