ninoseki / shodan-dojoLinks
Learning Shodan through katas
☆466Updated 5 years ago
Alternatives and similar repositories for shodan-dojo
Users that are interested in shodan-dojo are comparing it to the libraries listed below
Sorting:
- This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a …☆485Updated 5 years ago
- Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more a…☆373Updated 4 years ago
- TotalRecon installs all the recon tools you need☆465Updated 5 years ago
- Collection of pentesting scripts☆440Updated 3 years ago
- Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.☆732Updated this week
- Attack Surface Management since before Attack Surface Management was a thing☆652Updated last week
- hardCIDR is a Linux Bash script, but also functions under macOS. Your mileage may vary on other distros. The script with no specified opt…☆370Updated 3 years ago
- An OSINT tool that discovers sub-domains by searching Certificate Transparency logs☆473Updated 3 years ago
- A list of shodan filters☆577Updated 6 years ago
- The Web Application Hacker's Handbook - Extra Content☆560Updated 2 years ago
- AI-based, context-driven network device ranking☆301Updated last year
- A passive subdomain finder☆334Updated 2 years ago
- Course content, lab setup instructions and documentation of our very popular Breaking and Pwning Apps and Servers on AWS and Azure hands …☆941Updated 2 years ago
- An ongoing list of virtual cybersecurity conferences.☆122Updated 4 years ago
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆646Updated 4 years ago
- Tafferugli is a Twitter Analysis Framework☆361Updated 3 years ago
- Proofs of Concept. Just fucking around.☆193Updated 3 years ago
- A powerful target reconnaissance framework powered by graph theory.☆420Updated 3 years ago
- An open source intelligence tool to crawl the graph of certificate Alternate Names☆358Updated 2 months ago
- Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.☆748Updated 3 years ago
- Resources for Building Virtual Machine Labs Live Training. YEET.☆127Updated 6 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆636Updated 2 years ago
- Search exposed EBS volumes for secrets☆302Updated 2 years ago
- A mostly-serverless distributed hash cracking platform☆814Updated last year
- find out when and where someone is posting to reddit☆133Updated 5 years ago
- Pastebin OSINT Harvester☆326Updated 6 years ago
- A tool to hunt for credentials in github wild AKA git*hunt☆297Updated 2 years ago
- scylla.sh db dumps and more☆139Updated 5 years ago
- internet monitoring osint telegram bot for windows☆157Updated 2 years ago
- list of passwords more likely to be used by sysadmins, general nerds, and folk with access☆258Updated 10 months ago