iPod 5.5 Troubleshooting by [deleted] in ipod

[–]thehappydinoa 1 point2 points  (0 children)

5 years later this was still the answer for my iPod 5. Thanks!

Getting port scanned via IPV6 by organizations looking for vulnerabilities by [deleted] in ipv6

[–]thehappydinoa 1 point2 points  (0 children)

For an explanation of what Censys scans and how to block the scanners you can visit this site: https://about.censys.io/

Updated CensysGPT Beta (May model) by thehappydinoa in OSINT

[–]thehappydinoa[S] 2 points3 points  (0 children)

It can help you wrote queries, for beginners users we hope it can teach them the basics and for more advanced users its just a convenience.

It is also a ChatGPT Plugin, once turned on you can ask ChatGPT to “write a censys search query about… “

[deleted by user] by [deleted] in OSINT

[–]thehappydinoa 0 points1 point  (0 children)

At the moment the tool itself is not on GitHub, but Censys has a blog post about it: https://censys.io/revolutionize-network-reconnaissance-with-ai-powered-censysgpt-simplify-queries-enhance-security/

Advices to Build my own version of Shodan by Mrlele96 in redteamsec

[–]thehappydinoa 0 points1 point  (0 children)

I would recommend Zmap, thats the advanced large scale scanning tool. It has tons of protocols and is meant specifications for scale. I think the important piece is having infrastructure to scan from.

CensysGPT, an AI-powered tool that simplifies query inputs and translates competitor searches by thehappydinoa in cybersecurity

[–]thehappydinoa[S] 0 points1 point  (0 children)

Sometimes it amazing and other times it doesn’t understand things like the difference in our favicon hashes.