Query Shodan and Censys data for fast parsing
☆39Aug 7, 2018Updated 7 years ago
Alternatives and similar repositories for shocens
Users that are interested in shocens are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Convert your masscan/subdomain-scan results (80,443,8080) into screenshots for better analysis☆36Jul 10, 2018Updated 7 years ago
- Python code to query the Censys public scan database.☆153Jun 15, 2021Updated 4 years ago
- Fiddler2 Plugin for AMF format parsing☆14May 9, 2016Updated 9 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆23Jul 1, 2015Updated 10 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A sub-domain enumeration tool☆20May 18, 2020Updated 5 years ago
- Shodanwave - Netwave IP Camera☆18Nov 18, 2017Updated 8 years ago
- Censys.io Python API Search☆43May 3, 2017Updated 8 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Ransoblin (Ransomware Bokoblin)☆18Oct 4, 2020Updated 5 years ago
- Small python script to extract Facebook deeplinks from an APK file☆14Oct 30, 2020Updated 5 years ago
- ☆23Feb 16, 2016Updated 10 years ago
- Searches online paste sites for certain search terms which can indicate a possible data breach.☆75Oct 30, 2021Updated 4 years ago
- A tool for fuzzing for ports that allow outgoing connections☆17Oct 15, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Alpha version code of Recon UI☆15Feb 26, 2018Updated 8 years ago
- Extract OLEv1 objects from RTF files by instrumenting Word☆50Nov 19, 2019Updated 6 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- Identify the different types of hashes used to encrypt passwords.☆10Mar 12, 2017Updated 9 years ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆10Oct 12, 2020Updated 5 years ago
- ☆15Dec 15, 2020Updated 5 years ago
- Simple burp extension for routing traffic over tor. It instruments tor to switch to a new circuit after every N requests.☆20Jun 20, 2022Updated 3 years ago
- Babel-Shellfish deobfuscates and scans Powershell scripts on real-time right before each line execution.☆43Nov 10, 2018Updated 7 years ago
- jnlpdownloader is a Python script that takes a URL to a JNLP and downloads all the associated JARs and native libraries. Another Java ba…☆14Aug 16, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Web shells for use in penetration testing☆42Mar 5, 2015Updated 11 years ago
- Proof of concept showing how to exploit the CVE-2018-11759☆40Dec 11, 2018Updated 7 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- ☆66Feb 10, 2018Updated 8 years ago
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- ☆58Nov 27, 2014Updated 11 years ago
- Set of utilities for getting information about Windows Events☆15Jun 5, 2018Updated 7 years ago
- Is command prompt blocked on your school/work computers? Here is an easy fix!☆21Sep 19, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- Automatically exported from code.google.com/p/fuzzdb☆14Jun 23, 2015Updated 10 years ago
- A Burpsuite extension written in Python to perform basic validation fuzzing☆11Oct 7, 2022Updated 3 years ago
- Automatically performs the SMB relay attack☆73May 13, 2016Updated 9 years ago
- ☆20Jan 18, 2024Updated 2 years ago
- Gichidan - CLI wrapper for Ichidan deep-web search engine.☆33Apr 20, 2018Updated 7 years ago
- CVE-2018-3191 反弹shell☆16Oct 23, 2018Updated 7 years ago