ninoseki / shodan-dojoLinks
Learning Shodan through katas
☆465Updated 4 years ago
Alternatives and similar repositories for shodan-dojo
Users that are interested in shodan-dojo are comparing it to the libraries listed below
Sorting:
- Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more a…☆372Updated 4 years ago
- Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.☆720Updated this week
- TotalRecon installs all the recon tools you need☆464Updated 5 years ago
- This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a …☆480Updated 5 years ago
- Collection of pentesting scripts☆438Updated 3 years ago
- The Web Application Hacker's Handbook - Extra Content☆551Updated 2 years ago
- A passive subdomain finder☆330Updated 2 years ago
- hardCIDR is a Linux Bash script, but also functions under macOS. Your mileage may vary on other distros. The script with no specified opt…☆370Updated 3 years ago
- An ongoing list of virtual cybersecurity conferences.☆120Updated 4 years ago
- A list of shodan filters☆570Updated 6 years ago
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆635Updated 4 years ago
- ☆306Updated 2 months ago
- An OSINT tool that discovers sub-domains by searching Certificate Transparency logs☆472Updated 2 years ago
- An open source intelligence tool to crawl the graph of certificate Alternate Names☆353Updated last year
- AI-based, context-driven network device ranking☆298Updated last year
- Attack Surface Management since before Attack Surface Management was a thing☆648Updated last week
- Pastebin OSINT Harvester☆323Updated 6 years ago
- Harden your Chrome browser via enterprise policy.☆290Updated 2 years ago
- Course content, lab setup instructions and documentation of our very popular Breaking and Pwning Apps and Servers on AWS and Azure hands …☆940Updated 2 years ago
- Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.☆744Updated 3 years ago
- Search exposed EBS volumes for secrets☆297Updated 2 years ago
- Extract and Visualize Data from URLs using Unfurl☆677Updated last week
- Proofs of Concept. Just fucking around.☆193Updated 2 years ago
- This repo contains logstash of various honeypots☆174Updated 5 years ago
- Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wiki☆209Updated 8 months ago
- list of passwords more likely to be used by sysadmins, general nerds, and folk with access☆259Updated 7 months ago
- The main SamuraiWTF collaborative distro repo.☆518Updated 4 months ago
- find out when and where someone is posting to reddit☆130Updated 5 years ago
- Resources for Building Virtual Machine Labs Live Training. YEET.☆126Updated 6 years ago
- A powerful target reconnaissance framework powered by graph theory.☆420Updated 2 years ago