ninoseki / shodan-dojo
Learning Shodan through katas
☆464Updated 4 years ago
Alternatives and similar repositories for shodan-dojo:
Users that are interested in shodan-dojo are comparing it to the libraries listed below
- Attack Surface Management since before Attack Surface Management was a thing☆634Updated this week
- Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more a…☆372Updated 3 years ago
- TotalRecon installs all the recon tools you need☆461Updated 4 years ago
- A query aggregator for OSINT based threat hunting☆878Updated this week
- Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.☆699Updated this week
- An open source intelligence tool to crawl the graph of certificate Alternate Names☆346Updated last year
- A modular OSINT honeypot for blue teamers☆331Updated last year
- A passive subdomain finder☆329Updated last year
- A list of shodan filters☆554Updated 6 years ago
- Password spraying using AWS Lambda for IP rotation☆595Updated 2 years ago
- Pastebin OSINT Harvester☆321Updated 5 years ago
- An ongoing list of virtual cybersecurity conferences.☆117Updated 3 years ago
- This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a …☆473Updated 5 years ago
- hardCIDR is a Linux Bash script, but also functions under macOS. Your mileage may vary on other distros. The script with no specified opt…☆369Updated 3 years ago
- The Web Application Hacker's Handbook - Extra Content☆548Updated last year
- This repo contains logstash of various honeypots☆175Updated 4 years ago
- Search exposed EBS volumes for secrets☆297Updated last year
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.☆501Updated last year
- A golang utility to spider through a website searching for additional links.☆335Updated 4 years ago
- Private key usage verification☆424Updated 2 months ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆593Updated 3 years ago
- Scanning pastebin with yara rules☆1,081Updated 8 months ago
- ReconPi - A lightweight recon tool that performs extensive scanning with the latest tools.☆721Updated 2 years ago
- internet monitoring osint telegram bot for windows☆150Updated last year
- Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wiki☆202Updated 3 months ago
- Harden your Chrome browser via enterprise policy.☆283Updated last year
- A list of cloud ranges from different providers.☆460Updated 2 years ago
- An extendable tool to Collect, Crawl and Monitor onion sites on tor network and index collected information on Elasticsearch☆310Updated 2 years ago
- An OSINT tool that allows you to draw out relationships between people on LinkedIn via endorsements/skills.☆328Updated 3 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,003Updated 4 years ago