Query Shodan and Censys data for fast parsing
☆39Aug 7, 2018Updated 7 years ago
Alternatives and similar repositories for shocens
Users that are interested in shocens are comparing it to the libraries listed below
Sorting:
- Convert your masscan/subdomain-scan results (80,443,8080) into screenshots for better analysis☆36Jul 10, 2018Updated 7 years ago
- A tool for fuzzing for ports that allow outgoing connections☆17Oct 15, 2018Updated 7 years ago
- Python code to query the Censys public scan database.☆153Jun 15, 2021Updated 4 years ago
- Is command prompt blocked on your school/work computers? Here is an easy fix!☆21Sep 19, 2019Updated 6 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Jul 1, 2015Updated 10 years ago
- Censys.io Python API Search☆43May 3, 2017Updated 8 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- ☆23Feb 16, 2016Updated 10 years ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- Fiddler2 Plugin for AMF format parsing☆14May 9, 2016Updated 9 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Aug 13, 2018Updated 7 years ago
- Ransoblin (Ransomware Bokoblin)☆18Oct 4, 2020Updated 5 years ago
- Tool for automation of GUI-based testing.☆16Jan 7, 2015Updated 11 years ago
- Set of utilities for getting information about Windows Events☆15Jun 5, 2018Updated 7 years ago
- jnlpdownloader is a Python script that takes a URL to a JNLP and downloads all the associated JARs and native libraries. Another Java ba…☆14Aug 16, 2021Updated 4 years ago
- ☆58Nov 27, 2014Updated 11 years ago
- Small python script to extract Facebook deeplinks from an APK file☆14Oct 30, 2020Updated 5 years ago
- Alpha version code of Recon UI☆15Feb 26, 2018Updated 8 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- R interface to the Censys "cyber"/scans search engine • https://www.censys.io/tutorial☆14Aug 9, 2022Updated 3 years ago
- Automatically exported from code.google.com/p/fuzzdb☆14Jun 23, 2015Updated 10 years ago
- Web shells for use in penetration testing☆41Mar 5, 2015Updated 11 years ago
- Babel-Shellfish deobfuscates and scans Powershell scripts on real-time right before each line execution.☆43Nov 10, 2018Updated 7 years ago
- Shodanwave - Netwave IP Camera☆18Nov 18, 2017Updated 8 years ago
- A modular pentesting framework implemented in C☆13Aug 6, 2018Updated 7 years ago
- log file scrubber☆15Jul 27, 2018Updated 7 years ago
- Searches online paste sites for certain search terms which can indicate a possible data breach.☆75Oct 30, 2021Updated 4 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- MS15-076 Privilege Escalation☆16Aug 11, 2015Updated 10 years ago
- Automatically parses and attacks BloodHound-generated graphs☆43Jul 16, 2018Updated 7 years ago
- A tool for auditing network shares in an Active Directory environment☆44Apr 29, 2019Updated 6 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Jun 3, 2016Updated 9 years ago
- Random Code☆25Apr 18, 2011Updated 14 years ago
- ☆20Jan 18, 2024Updated 2 years ago
- ☆15Dec 15, 2020Updated 5 years ago
- Extract OLEv1 objects from RTF files by instrumenting Word☆50Nov 19, 2019Updated 6 years ago
- Automatically performs the SMB relay attack☆73May 13, 2016Updated 9 years ago