Harrison-Mitchell / NSEC-3-WalkerLinks
Performs DNS zone dumps by walking DNSSEC NSEC(3) records.
☆29Updated 3 years ago
Alternatives and similar repositories for NSEC-3-Walker
Users that are interested in NSEC-3-Walker are comparing it to the libraries listed below
Sorting:
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 9 months ago
- Get root via TTY / TIOCSTI stuffing☆76Updated 6 months ago
- masscan with exclusive excludes☆58Updated 2 years ago
- IPSpinner works as a local proxy that redirects requests through external services.☆106Updated 7 months ago
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆70Updated 3 weeks ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Updated last year
- Use WordPress pingback.ping to transfer files.☆16Updated last year
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆164Updated last year
- nTask is a distributed task management program that allows you to distribute tasks across multiple computers using API communication and …☆15Updated 3 months ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆52Updated 8 months ago
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆90Updated last year
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆75Updated 2 years ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆26Updated 10 months ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆42Updated 5 months ago
- A Python script to extract the serial number of a remote Fortinet device.☆31Updated 7 months ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆148Updated last year
- A python library to interact with Pwndoc instances for pentest reports generation☆21Updated 5 months ago
- Generate a report with charts and statistics about cracked passwords in XLSX format☆34Updated 8 months ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆54Updated 9 months ago
- Fast website scraper and wordlist generator☆81Updated 6 months ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆33Updated last year
- Next generation fireprox AWS API endpoint creation utility.☆54Updated 2 years ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆71Updated last week
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆86Updated 2 months ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆28Updated 2 years ago
- tool for identifying guest relationships between companies☆103Updated last year
- Dump Kerberos tickets from the KCM database of SSSD☆52Updated last year
- Exploits Unauth Docker API☆42Updated 6 months ago
- Detailed explanation of Windows cryptographic algorithms, with examples and schemes.☆21Updated 11 months ago
- Python script to check if there is any differences in responses of an application when the request comes from a search engine's crawler.☆22Updated 2 years ago