awesome-shodan-queries icon indicating copy to clipboard operation
awesome-shodan-queries copied to clipboard

🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩‍💻

Results 15 awesome-shodan-queries issues
Sort by recently updated
recently updated
newest added

appended threathunting queries + table of content entry "Threathunting" + content entry "Threathunting" ++ added entries {C2 traffic, Cobalt Strike, Metasploit Framework, Covenant, Mythic, Brute Ratel C4} + Sources/ credits...

The (voter system serial" country:US) query does not identify voting machines, but a specific serial radio (AM, FM) system. http://wvraclub.org/technical-documents/what-is-a-receiver-voting-system/

This is typically what I use: `server: calibre country:"US"` Of course, remove or change the country bit to expand the results.

`"rdesktop" or "remote desktop protocol" ` If you have rdesktop, you may be able to connect to them. To get a login screen, all you need is the IP address.

New query: ``` HP-ILO-4 !"HP-ILO-4/2.53" !"HP-ILO-4/2.54" !"HP-ILO-4/2.55" !"HP-ILO-4/2.60" !"HP-ILO-4/2.61" !"HP-ILO-4/2.62" !"HP-iLO-4/2.70" !"HP-iLO-4/2.71" !"HP-iLO-4/2.72" !"HP-iLO-4/2.73" !"HP-iLO-4/2.74" !"HP-iLO-4/2.75" !"HP-iLO-4/2.76" port:1900 ```

https://gist.github.com/Gusted/ff545600e60b0fa03d1fbaf95d237751 ThinVNC are vulnerable for authentication bypass

new query

Calling all pentesters and/or people like myself who find infosec pretty neat! Do you have any cool [Shodan.io](https://shodan.io) queries that you've come across — cool, funny, interesting, scary, facepalm-inducing, or...

hacktoberfest