yoryio / ShodanFaviconView external linksLinks
List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.
☆35Apr 14, 2024Updated last year
Alternatives and similar repositories for ShodanFavicon
Users that are interested in ShodanFavicon are comparing it to the libraries listed below
Sorting:
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆33Feb 2, 2026Updated last week
- ☆10Mar 11, 2024Updated last year
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 3 months ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Script to chain search parameters for MalwareBazaar☆12Jan 26, 2025Updated last year
- ☆12Jul 15, 2022Updated 3 years ago
- ☆11Apr 8, 2024Updated last year
- rust clr heap encryption (https://github.com/lap1nou/CLR_Heap_encryption), but no heap encryption.☆17Jan 6, 2024Updated 2 years ago
- Troubleshooting MDE Workstations☆42Jan 7, 2026Updated last month
- CVE-2022-1040☆17Sep 25, 2022Updated 3 years ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 4 months ago
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆15Mar 13, 2022Updated 3 years ago
- ☆16Apr 21, 2023Updated 2 years ago
- Easy encrypt/decrypt data with TPM☆25Feb 28, 2024Updated last year
- improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys☆49Mar 10, 2023Updated 2 years ago
- ☆24Nov 19, 2024Updated last year
- kill AV/EDR☆21Jun 9, 2023Updated 2 years ago
- Section-based payload obfuscation technique for x64☆64Aug 8, 2024Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆55Dec 5, 2024Updated last year
- ☆73Feb 25, 2024Updated last year
- The Brandefense cyber threat intelligence team is always researching new threats and writing research reports. Our latest Threat Reports …☆23Oct 1, 2025Updated 4 months ago
- This code silently installs Chrome extensions on Mac, Windows, and Linux☆127Jul 22, 2025Updated 6 months ago
- CVE-2024-4879 - Jelly Template Injection Vulnerability in ServiceNow☆26Jul 13, 2024Updated last year
- malleable profile generator GUI for Havoc☆55Apr 28, 2023Updated 2 years ago
- This Chromium extensions aims at supporting the analysis of single sign-on implementations, by offering semi-automated analysis and attac…☆29Jul 4, 2023Updated 2 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆127Apr 6, 2024Updated last year
- ETW based POC to identify direct and indirect syscalls☆189Apr 19, 2023Updated 2 years ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆32Jan 30, 2026Updated 2 weeks ago
- ☆34Aug 23, 2022Updated 3 years ago
- An exploit for Microsoft IIS 6.0 CVE-2017-7269☆22Mar 29, 2017Updated 8 years ago
- ☆11May 17, 2024Updated last year
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆182Feb 2, 2026Updated last week
- Authentication Bypass in GoAnywhere MFT☆65Jan 23, 2024Updated 2 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆123Jul 21, 2022Updated 3 years ago
- Windows Thread Pool Injection Havoc Implementation☆33Mar 23, 2024Updated last year
- 横向移动三剑客 ( Lateral movement tools)☆30Nov 16, 2021Updated 4 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- Analyze Content-Security-Policy header of a given URL.☆33Jan 10, 2024Updated 2 years ago