☆24Nov 18, 2023Updated 2 years ago
Alternatives and similar repositories for DNS-brute-force
Users that are interested in DNS-brute-force are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Nov 12, 2023Updated 2 years ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Oct 14, 2023Updated 2 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆45Aug 9, 2023Updated 2 years ago
- A small executable to trick a user to authenticate using code matching MFA☆68Oct 6, 2023Updated 2 years ago
- OmniCrawl is a web measurement tool that allows for recording of web requests and JavaScript browser API accesses on multiple platforms.☆28Mar 20, 2024Updated 2 years ago
- XML-RPC Vulnerability Checker and Directory Fuzzer☆22Sep 28, 2023Updated 2 years ago
- Template Nuclei SSTI☆34Nov 18, 2025Updated 4 months ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆63Apr 13, 2024Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Dec 6, 2023Updated 2 years ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Dec 20, 2023Updated 2 years ago
- A Discord bot that searches the dark web for your query and returns links and screenshots of the results to your discord channel using ah…☆116Aug 3, 2024Updated last year
- A web service to clean documents from potentially privacy-invasive metadata☆50Apr 29, 2025Updated 10 months ago
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆132Jun 1, 2024Updated last year
- NetworkAssessment: Network Compromise Assessment Tool☆93May 31, 2024Updated last year
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆153May 17, 2024Updated last year
- Bypass 403 pages☆130Jun 30, 2024Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Mar 6, 2024Updated 2 years ago
- Distribución para OSINT basada en Debian 12 / OSINT Distribution based in Debian 12☆91May 18, 2025Updated 10 months ago
- Threat-Surface helps with daily tracking of exposed servers, open ports, and infrastructure used by threat actors.☆51Jan 16, 2026Updated 2 months ago
- InfoHound is an OSINT to extract a large amount of data given a web domain name.☆162Oct 8, 2025Updated 5 months ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Aug 13, 2023Updated 2 years ago
- Hadoken: A versatile Active Directory pentesting tool engineered to identify vulnerabilities and streamline security assessments.☆46Oct 26, 2025Updated 4 months ago
- Source code and examples for PassiveAggression☆64Jun 6, 2024Updated last year
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- Web Path Finder☆60Nov 22, 2023Updated 2 years ago
- masscan with exclusive excludes☆58Nov 8, 2023Updated 2 years ago
- Discord bot for the Shodan API - OSINT tool☆87Mar 8, 2024Updated 2 years ago
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆46Aug 1, 2023Updated 2 years ago
- Security testing tool for analyzing HTTP 403 responses and identifying access control misconfigurations in web applications.☆177Jan 6, 2026Updated 2 months ago
- Mass bruteforce authentication of common services with common credentials.☆54Dec 2, 2023Updated 2 years ago
- HARpwn - HARToken Extraction and Sanitization Module; HARpwn is a PowerShell module designed to streamline the extraction and sanitizati…☆20Nov 3, 2023Updated 2 years ago
- Simple Latest CVE Collector Written in Python☆59Feb 29, 2024Updated 2 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Feb 9, 2024Updated 2 years ago
- Subcert is a subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.☆80Jun 28, 2021Updated 4 years ago
- Redirect All Traffic Through Tor Network For Kali Linux☆221Mar 26, 2025Updated 11 months ago
- The Tool will fetch the article links for you, based on your query. Enter anything you want to search, whether a vulnerability descriptio…☆11Jan 2, 2021Updated 5 years ago
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Dec 26, 2023Updated 2 years ago