Performs DNS zone dumps by walking DNSSEC NSEC(3) records.
☆30Oct 1, 2022Updated 3 years ago
Alternatives and similar repositories for NSEC-3-Walker
Users that are interested in NSEC-3-Walker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Burp plugin for jxscout☆21May 12, 2025Updated 11 months ago
- Hacker Animation Cool Console Kryptographic Sequencer (haccks)☆14Oct 14, 2024Updated last year
- List of subdomain and dynamic DNS providers☆13Dec 11, 2025Updated 4 months ago
- A Sigma based detection pipeline☆12Dec 15, 2023Updated 2 years ago
- Automated compromise detection of the world's most popular packages☆16Sep 25, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Webshell agent in aspx and php☆27Dec 11, 2025Updated 4 months ago
- Utilizing DLang For Offensive Operations.☆15May 29, 2025Updated 11 months ago
- irc bot to play ascii art☆19Mar 27, 2026Updated last month
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆32Feb 13, 2026Updated 2 months ago
- 52-Dark theme for IDA Pro☆35Apr 2, 2025Updated last year
- Kiwi PN532 SPI library for Arduino☆15Feb 2, 2026Updated 3 months ago
- moved to https://github.com/ircart/ircart/wiki☆22Jun 6, 2023Updated 2 years ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆16Jul 18, 2022Updated 3 years ago
- Unpacker for donut shellcode☆22Jun 20, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Aug 11, 2023Updated 2 years ago
- ☆13Apr 26, 2025Updated last year
- irc bot with many useful commands☆12Jun 25, 2019Updated 6 years ago
- sans-I/O IRC session state parsing library☆17Sep 17, 2024Updated last year
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆18Aug 31, 2022Updated 3 years ago
- Partially offline multi-language translator built upon Huggingface transformers.☆16Sep 12, 2022Updated 3 years ago
- Kernel module that allows hiding files in any filesystem☆24Dec 20, 2024Updated last year
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Recon scripts for Red Team and Web blackbox auditing☆25Mar 3, 2026Updated 2 months ago
- Implementation of Indirect Syscall technique to pop a calc.exe☆112Jan 25, 2024Updated 2 years ago
- Ping-based Information Lookup and Outbound Transfer☆79Apr 16, 2024Updated 2 years ago
- ☆23Jun 9, 2024Updated last year
- BaseQuery is an OSINT tool used import email and password data files from security breaches, storing them in a way that is extremely quic…☆17Feb 9, 2019Updated 7 years ago
- Unmask real IP address of a domain hidden behind Cloudflare by IPs bruteforcing☆25Dec 3, 2024Updated last year
- Load and execute a common object file format (COFF) in the current process☆31Mar 9, 2024Updated 2 years ago
- ☆40Aug 12, 2022Updated 3 years ago
- Python code to Serialize and Unserialize java binary serialization format.☆29Feb 27, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆97Aug 23, 2025Updated 8 months ago
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆16May 26, 2017Updated 8 years ago
- ☆16Sep 5, 2024Updated last year
- Tool to dump cisco device configs via snmp and/or add new users☆13Apr 28, 2026Updated last week
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆38Sep 14, 2023Updated 2 years ago
- This guide leverages QEMU on unix to capture and analyze PCIE devices☆26Mar 8, 2026Updated 2 months ago
- ☆103Oct 27, 2022Updated 3 years ago