Bulk scanning of Hosts and IPs using the Shodan API
☆10Apr 26, 2022Updated 3 years ago
Alternatives and similar repositories for ShoFinder
Users that are interested in ShoFinder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SightingDB is a database for Sightings☆22Jun 21, 2023Updated 2 years ago
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Dec 24, 2023Updated 2 years ago
- Patch to disable rrlogd encryption in newer firmwares of the Xiaomi roborock vaccum☆13Feb 7, 2022Updated 4 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- Unofficial gnuk mirror☆19Feb 16, 2021Updated 5 years ago
- Networking exploration in golang to build a security enhanced version of netcat☆10Feb 20, 2018Updated 8 years ago
- Telegram Bug Bounty Bot☆32Jan 3, 2017Updated 9 years ago
- A little steganography. Hiding text or file inside an image using LSB method☆16Nov 15, 2019Updated 6 years ago
- A Django based web page to test your security tools☆10May 8, 2013Updated 12 years ago
- ASP.Net Core version of the Switch Lan Play Relay server, originally written by SpaceMeowX2 in NodeJs/Typescript which can be found here:…☆10Mar 26, 2020Updated 5 years ago
- hook detector using emulation and comparing static with dynamic outputs☆17Aug 11, 2023Updated 2 years ago
- Very Powerful and Easy Automated Web Scanner☆23Feb 2, 2021Updated 5 years ago
- ☆20Jan 31, 2020Updated 6 years ago
- Τεκμηρίωση για τα επεισόδια της Άσκησης Κυβερνοάμυνας Πανόπτης 2016☆16Jun 7, 2016Updated 9 years ago
- ☆25Dec 7, 2018Updated 7 years ago
- A bluetooth device tracker for raspberry pis that uses mqtt to provide presence notifications.☆20Oct 16, 2019Updated 6 years ago
- 🦎 Prototypes on polymorphic, metamorphic and poly-metamorphic malwares in Rust 🦎☆14Oct 8, 2023Updated 2 years ago
- Proof of concept where swapper implemented as external module☆19Mar 16, 2025Updated last year
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Nov 23, 2025Updated 4 months ago
- A barebones utility for metamorphic testing in Rust☆19Oct 22, 2019Updated 6 years ago
- Scripts and tools for ISM hacking☆16Mar 25, 2018Updated 7 years ago
- Cheatsheets and write ups for the CREST CRT and CCT Exams.☆20Aug 5, 2020Updated 5 years ago
- this tool will give you freedom to crack wpa-wpa2 passwords with ease and also in a efficient way without any hassle.☆11May 25, 2019Updated 6 years ago
- Upload, save and run keystroke injection payloads with an CJMCU-3212☆42Sep 24, 2021Updated 4 years ago
- ☆11Aug 2, 2017Updated 8 years ago
- PoC Exploiting Permission Bypass in Android's Download Provider (CVE-2018-9468)☆20Jan 15, 2020Updated 6 years ago
- USB rubber ducky reverse shell with disabling windows defender☆12Apr 17, 2021Updated 4 years ago
- ☆17Jul 13, 2016Updated 9 years ago
- ☆25Feb 7, 2025Updated last year
- On November 8, 2020, this project achieved the first use of deep convolutional neural networks (CNN) on-board a spacecraft.☆17Jan 20, 2024Updated 2 years ago
- CVE-2019-0232-Remote Code Execution on Apache Tomcat 7.0.42☆20Nov 21, 2019Updated 6 years ago
- Real-time application for estimating the number of people in an area using Bluetooth and WiFi signals.☆35Mar 31, 2023Updated 2 years ago
- There are many cheat sheets out there, but this is mine.☆37Feb 27, 2025Updated last year
- KDE activities for hyprland [maintainer=@yavko]☆21May 15, 2024Updated last year
- HackTheBox rich presence for Discord☆13May 30, 2024Updated last year
- 在运行ZeppOS的手表上实现查看btc此刻的价格☆13Jun 17, 2022Updated 3 years ago
- featured cs:go internal hack, one file and less than 1000 lines.☆11Apr 19, 2021Updated 4 years ago
- Extract PGP secret keys from Gnuk / Nitrokey Start firmwares☆51Aug 4, 2019Updated 6 years ago
- Linux rust keylogger☆18Mar 1, 2024Updated 2 years ago