Harrison-Mitchell / NSEC-3-WalkerLinks
Performs DNS zone dumps by walking DNSSEC NSEC(3) records.
☆30Updated 3 years ago
Alternatives and similar repositories for NSEC-3-Walker
Users that are interested in NSEC-3-Walker are comparing it to the libraries listed below
Sorting:
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 10 months ago
- masscan with exclusive excludes☆58Updated 2 years ago
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆71Updated last month
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Updated 2 years ago
- IPSpinner works as a local proxy that redirects requests through external services.☆110Updated 8 months ago
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆26Updated 3 years ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆68Updated last year
- Get root via TTY / TIOCSTI stuffing☆76Updated 6 months ago
- Rebuild of portspoof in GO with additional features.☆25Updated last month
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆27Updated 11 months ago
- Fast website scraper and wordlist generator☆82Updated 6 months ago
- Script for importing Nmap results into a Neo4j Graph Database☆23Updated 7 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆73Updated 3 weeks ago
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆163Updated 2 years ago
- Dump Kerberos tickets from the KCM database of SSSD☆52Updated last year
- Quickly find all identities someone has used on their Github commits☆16Updated last year
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆75Updated last year
- CLI & library to search for default credentials among thousands of Products / Vendors☆54Updated 10 months ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆53Updated 8 months ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆148Updated last year
- ☆18Updated last year
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆90Updated last year
- Use WordPress pingback.ping to transfer files.☆16Updated last year
- Unicode Security Toolkit☆40Updated last year
- Next generation fireprox AWS API endpoint creation utility.☆56Updated 2 years ago
- tool for identifying guest relationships between companies☆103Updated last year
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆42Updated 5 months ago
- Interactive results explorer and annotation tool for Nosey Parker☆42Updated 5 months ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆87Updated 3 months ago