spicesouls / basilisk
A Tool using Shodan and RTSP to find vulnerable cameras around the world.
☆57Updated 4 years ago
Alternatives and similar repositories for basilisk:
Users that are interested in basilisk are comparing it to the libraries listed below
- thelordseye searches and returns detailed information about devices that are directly connected to the internet [IoT] (Smart TV's, Fridge…☆63Updated last year
- This is a guide for Penetration Testers how to use Penetration Testing tools and their advanced used. Need everyone's help to make it bat…☆50Updated 4 years ago
- A tool for WI-FI penetration testing that automates your attacking processes.☆29Updated last month
- ☆19Updated 6 years ago
- All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.☆75Updated 3 months ago
- Information Gathering Tool☆54Updated 2 years ago
- An easy to handle hacking script, SSH Forcebrute, FTP Forcebrute and many others features☆64Updated 3 years ago
- Twitter Eye is a Twitter Information Gathering Tool With Twitter Eye, you can search with various keywords and usernames on Twitter. Then…☆43Updated last month
- Tenssens framework focused on gathering information from free tools or resources. The intention is to help people find free OSINT resourc…☆67Updated 3 years ago
- Information Gathering tool for a Website or IP address☆45Updated last year
- An OSINT tool to gather information about the real owner of a phone number☆47Updated 4 years ago
- ☆29Updated 3 years ago
- Binaries Payloads Web Payloads Scripting Payloads Shellcode☆39Updated 6 years ago
- You guessed well, genius !! This tool is intended for the initiation to ethical hacking with python☆66Updated 5 years ago
- An OSINT focused tool made with Nodejs!☆92Updated 2 years ago
- Automated Payload Generator Tool☆107Updated 4 years ago
- This is a simple web application vulnerability scanner that checks if a given URL or IP address is vulnerable to 37 common web applicatio…☆23Updated 2 years ago
- Designed to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .o…☆105Updated 3 years ago
- HacKing Tools Downloader: Downloading HacKing Tools and exporting by categories to $HOME directory☆82Updated 2 years ago
- Best social media phishing☆23Updated 4 years ago
- An OSINT tool to find user's all over the internet including social media platforms☆90Updated last year
- Simple OSINT phone number lookup!☆25Updated last year
- Make a Fake wireless access point aka Evil Twin....Easily!!☆67Updated 2 years ago
- Find exploits in local and online database☆73Updated 6 months ago
- Fast exploitation based on metasploit.☆73Updated 5 years ago
- Based on reading from The Hackers Playbook 3☆29Updated 5 years ago
- Information Gathering Simplified.☆64Updated 2 years ago
- Phoneinfoga Maltego Transform☆111Updated last year
- An Automated Database Hacking Software with Database Dorks Hacking☆29Updated 5 years ago
- Hacking Tools Z0172CK☆31Updated last year