Build interactive map of cameras from Shodan
☆1,264Jun 28, 2020Updated 5 years ago
Alternatives and similar repositories for kamerka
Users that are interested in kamerka are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ultimate Internet of Things/Industrial Control Systems reconnaissance tool.☆835May 22, 2023Updated 2 years ago
- Correlate data between domains, IPs and email addresses, present it as a graph and store everything into Elasticsearch and JSON files.☆697May 16, 2020Updated 5 years ago
- Find open databases - Powered by Binaryedge.io☆1,435Jun 28, 2020Updated 5 years ago
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆8,644Jun 20, 2024Updated last year
- Collect information about email addresses from Pastebin☆39Jun 1, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment☆1,193Oct 24, 2018Updated 7 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,452Nov 20, 2025Updated 4 months ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,271Nov 20, 2025Updated 4 months ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆424Updated this week
- ☆276Feb 20, 2021Updated 5 years ago
- Know the dangers of credential reuse attacks.☆2,102Dec 9, 2025Updated 4 months ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,298Jul 10, 2024Updated last year
- Collection of Scripts for shodan searching stuff.☆1,141Jan 14, 2026Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- GTRS - Google Translator Reverse Shell☆626Sep 26, 2025Updated 6 months ago
- Active Directory Assessment and Privilege Escalation Script☆1,129Dec 7, 2022Updated 3 years ago
- A Tool for Domain Flyovers☆5,923May 22, 2022Updated 3 years ago
- OSINT python webscaping framework☆1,138Dec 8, 2022Updated 3 years ago
- Script is a proof of concept how to control your machine by using social media sites.☆23Feb 14, 2018Updated 8 years ago
- A powerful target reconnaissance framework powered by graph theory.☆420Oct 21, 2022Updated 3 years ago
- Scanning pastebin with yara rules☆1,133Jan 10, 2026Updated 3 months ago
- Automated Mass Exploiter☆5,228May 22, 2023Updated 2 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Incredibly fast crawler designed for OSINT.☆12,807Feb 10, 2026Updated 2 months ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆400May 20, 2020Updated 5 years ago
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,829Nov 19, 2024Updated last year
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,561Oct 16, 2025Updated 6 months ago
- A Modern Orchestration Engine for Security☆6,193Apr 6, 2026Updated last week
- A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux☆1,416Oct 3, 2020Updated 5 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,549Aug 2, 2019Updated 6 years ago
- Small script for retrieving incoming transactions based on provided hour period.☆14Jan 24, 2022Updated 4 years ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,335Dec 6, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆947May 8, 2019Updated 6 years ago
- A swiss army knife for pentesting networks☆9,124Dec 6, 2023Updated 2 years ago
- 🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻☆7,337May 27, 2024Updated last year
- Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Dir…☆1,620Jan 23, 2024Updated 2 years ago
- Network share sniffer and auto-mounter for crawling remote file systems☆214Mar 27, 2022Updated 4 years ago
- Detect firearm and nudity on Twitter and Instagram☆14Mar 27, 2019Updated 7 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆680Oct 28, 2023Updated 2 years ago