Shodan-Dork
by Mr.k0anti
Target Domain :) type ssl:"target" or org:"target"
🔍
Prodect mysql found
🔍
MongoDB
🔍
defult password
🔍
guest login
🔍
Jenkins Unrestricted Dashboard
🔍
wp config
🔍
root session
🔍
defult wireless password
🔍
Auth desabled
🔍
dashboard
🔍
control panal
🔍
phpmyadmin
🔍
CouchDB
🔍
kibana
🔍
CVE-2021-26855-CVE-2021-31206 Microsoft RCE
🔍
CVE-2022-29464 WSO2 RCE
🔍
CVE-2022-29464.WSO2 RCE
🔍
Cisco ASA CVE-2020-3452
🔍
Windows SMB exposures
🔍
CVE-2022-22954 in VMWare Workspace ONE
🔍
Find secret API keys publicly exposed #2
🔍
Find all jenkins server
🔍
Find all grafana dashboards
🔍
CVE-2022-24255 Main & Admin Portals: Authentication Bypass
🔍
Horde webmail A takeover
🔍
CVE-2022-24348:path traversal
🔍
tomcat may log4j
🔍
NO password required for telnet
🔍
Windows RDP Password:
🔍
proftpd port:21
🔍
"authentication disabled" "RFB 003.008"
🔍
CVE CVE-2019-11510
🔍
F5 BIG-IP using CVE-2020-5902
🔍
unauthorized
🔍
Mongo Express Web GUI
🔍
Jenkins CI
🔍
Intel Active Management CVE-2017-5689
🔍
Apache Directory Listings
🔍
HP Printers
by Mr.Koanti; thank to faisalahmed google dorks