stavinski / showdown
Perform OSINT on external targets using Shodan
☆21Updated last year
Alternatives and similar repositories for showdown:
Users that are interested in showdown are comparing it to the libraries listed below
- ParamChanger is a tool allowing you to replace the parameters of a list of urls by a payload entered as an argument☆13Updated 2 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- An exotic service bruteforce tool.☆12Updated 2 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 2 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22Updated this week
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 2 years ago
- Automate Auxiliary Module in Metasploit☆20Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- A basic proxylogon scanner☆27Updated 3 years ago
- Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.☆9Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆25Updated 2 years ago
- Automate email search in HaveIBeenPwned☆11Updated 3 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆32Updated last week
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆37Updated 2 years ago
- ☆12Updated 2 years ago
- Quickly discover exposed hosts on the internet using multiple search engine.☆9Updated 3 years ago
- Burp suite Certificate modification tool☆18Updated last year
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 10 months ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Updated 3 years ago
- ☆12Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Strumenti per Domini - Whois - IP - Data Breach - Email☆15Updated 4 months ago
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆21Updated 2 years ago
- SMTP Open Relay Exploitation☆13Updated 4 years ago
- subdog is a subdomain enumeration tools, this tool collect number of different sources to create a list of root subdomains☆15Updated last month
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆17Updated 3 months ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆12Updated 8 months ago
- Find open databases - Powered by Binaryedge.io☆15Updated 5 years ago