Harrison-Mitchell / NSEC-3-WalkerLinks
Performs DNS zone dumps by walking DNSSEC NSEC(3) records.
☆29Updated 3 years ago
Alternatives and similar repositories for NSEC-3-Walker
Users that are interested in NSEC-3-Walker are comparing it to the libraries listed below
Sorting:
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 8 months ago
- masscan with exclusive excludes☆57Updated last year
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆70Updated this week
- IPSpinner works as a local proxy that redirects requests through external services.☆96Updated 7 months ago
- Fast website scraper and wordlist generator☆81Updated 5 months ago
- Generate a report with charts and statistics about cracked passwords in XLSX format☆34Updated 7 months ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆26Updated 10 months ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆51Updated 7 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Updated last year
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆68Updated last year
- Interactive results explorer and annotation tool for Nosey Parker☆38Updated 3 months ago
- Do bulk whois lookups and get alerted on domains of interest.☆43Updated last year
- Get root via TTY / TIOCSTI stuffing☆77Updated 5 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆71Updated this week
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆146Updated last year
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆26Updated 3 years ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆54Updated 8 months ago
- Check robustness of your (their) Active Directory accounts passwords☆45Updated 7 months ago
- Automate converting webshells into reverse shells.☆70Updated last week
- ☆18Updated last year
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆42Updated 4 months ago
- tool for identifying guest relationships between companies☆103Updated last year
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆67Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- CVE-2013-4786 Go exploitation tool☆39Updated last year
- Dump Kerberos tickets from the KCM database of SSSD☆51Updated last year
- Exploits Unauth Docker API☆41Updated 6 months ago
- Use WordPress pingback.ping to transfer files.☆16Updated last year
- ☆27Updated 2 years ago