ninoseki / shodan-dojo
Learning Shodan through katas
☆466Updated 4 years ago
Alternatives and similar repositories for shodan-dojo
Users that are interested in shodan-dojo are comparing it to the libraries listed below
Sorting:
- Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more a…☆372Updated 4 years ago
- The Web Application Hacker's Handbook - Extra Content☆550Updated last year
- A query aggregator for OSINT based threat hunting☆892Updated this week
- hardCIDR is a Linux Bash script, but also functions under macOS. Your mileage may vary on other distros. The script with no specified opt…☆370Updated 3 years ago
- An open source intelligence tool to crawl the graph of certificate Alternate Names☆350Updated last year
- Attack Surface Management since before Attack Surface Management was a thing☆643Updated last week
- Pastebin OSINT Harvester☆323Updated 6 years ago
- TotalRecon installs all the recon tools you need☆463Updated 4 years ago
- This repo contains logstash of various honeypots☆174Updated 5 years ago
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆630Updated 3 years ago
- A modular OSINT honeypot for blue teamers☆333Updated 2 years ago
- Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.☆711Updated last week
- Collection of pentesting scripts☆434Updated 3 years ago
- AI-based, context-driven network device ranking☆297Updated last year
- A passive subdomain finder☆328Updated 2 years ago
- Collection of scripts & fingerprinting tricks for Shodan.io☆253Updated 4 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆624Updated 2 years ago
- ReconPi - A lightweight recon tool that performs extensive scanning with the latest tools.☆725Updated 3 years ago
- Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wiki☆203Updated 6 months ago
- A list of shodan filters☆561Updated 6 years ago
- Proofs of Concept. Just fucking around.☆193Updated 2 years ago
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.☆517Updated last year
- A tool to hunt for credentials in github wild AKA git*hunt☆294Updated 2 years ago
- Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.☆737Updated 3 years ago
- Slides for Reverse Engineering 101 in 20 minutes as presented at Pancakes Con☆125Updated 5 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆640Updated 3 years ago
- Course content, lab setup instructions and documentation of our very popular Breaking and Pwning Apps and Servers on AWS and Azure hands …☆938Updated 2 years ago
- internet monitoring osint telegram bot for windows☆153Updated 2 years ago
- find out when and where someone is posting to reddit☆130Updated 5 years ago
- A portable OSINT Swiss Army Knife for DFIR/OSINT professionals 🕵️ 🕵️ 🕵️☆263Updated last year