Harrison-Mitchell / NSEC-3-WalkerLinks
Performs DNS zone dumps by walking DNSSEC NSEC(3) records.
☆30Updated 3 years ago
Alternatives and similar repositories for NSEC-3-Walker
Users that are interested in NSEC-3-Walker are comparing it to the libraries listed below
Sorting:
- IVRE's fork of the famous TCP port scanner. See below for details.☆39Updated 10 months ago
- masscan with exclusive excludes☆58Updated 2 years ago
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆72Updated 2 months ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆52Updated 9 months ago
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆163Updated 2 years ago
- 🎒 An up-to-date collection of precompiled binaries and hacking scripts.☆47Updated this week
- Get root via TTY / TIOCSTI stuffing☆76Updated 7 months ago
- Script for importing Nmap results into a Neo4j Graph Database☆24Updated 7 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Updated last year
- A python library to interact with Pwndoc instances for pentest reports generation☆21Updated 7 months ago
- Automate converting webshells into reverse shells.☆71Updated 2 weeks ago
- Generate a report with charts and statistics about cracked passwords in XLSX format☆36Updated 3 weeks ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Updated 2 years ago
- IPSpinner works as a local proxy that redirects requests through external services.☆112Updated 9 months ago
- Use WordPress pingback.ping to transfer files.☆16Updated last year
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆42Updated 6 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆75Updated this week
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆45Updated last year
- Quickly find all identities someone has used on their Github commits☆16Updated last year
- Fast website scraper and wordlist generator☆82Updated 7 months ago
- A blazing fast, high performance implementation of AutoRecon in Rust. A multi-threaded network reconnaissance tool which performs automa…☆45Updated 11 months ago
- Rebuild of portspoof in GO with additional features.☆24Updated 2 months ago
- AssetViz simplifies the visualization of subdomains from input files, presenting them as a coherent mind map. Ideal for penetration test…☆37Updated last year
- Interactive results explorer and annotation tool for Nosey Parker☆44Updated 5 months ago
- Detailed explanation of Windows cryptographic algorithms, with examples and schemes.☆21Updated last year
- ☆78Updated last year
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆90Updated last year
- nTask is a distributed task management program that allows you to distribute tasks across multiple computers using API communication and …☆15Updated 5 months ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆76Updated last year
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆148Updated last year