AkiCodex / DNS-brute-force
☆23Updated last year
Alternatives and similar repositories for DNS-brute-force:
Users that are interested in DNS-brute-force are comparing it to the libraries listed below
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated 11 months ago
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆47Updated 8 months ago
- ☆61Updated 9 months ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆27Updated last year
- ProxyChecker Made in NodeJS☆37Updated 2 years ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆27Updated last year
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Updated last year
- Fast Path Traversal exploitation tool☆21Updated 9 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆50Updated 4 months ago
- ☆15Updated last year
- Top 400 passwords as per HaveIBeenPwned☆21Updated 4 months ago
- This repository contains the best fuzzing wordlist files☆29Updated 2 months ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆57Updated 2 months ago
- Web Path Finder☆60Updated last year
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Updated last year
- PassBreaker☆56Updated 10 months ago
- DLink DIR-846 Authenticated Remote Code Execution☆18Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆34Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆57Updated 11 months ago
- CoupDeWeb is an automated web vulnerability scanner designed for security researchers and developers. It scans for potential vulnerable …☆21Updated 3 months ago
- Herramienta en Bash ideal para extraer la información más relevante de un dominio vía rpcclient.☆17Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆113Updated last year
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆28Updated 6 months ago
- ☆26Updated 2 years ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆93Updated last year
- Auto exploitation tool for CVE-2024-24401.☆31Updated 5 months ago