Recurrent Neural Network SubDomain Discovery Tool
☆95Sep 20, 2022Updated 3 years ago
Alternatives and similar repositories for Affinis
Users that are interested in Affinis are comparing it to the libraries listed below
Sorting:
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Sep 11, 2024Updated last year
- ☆59Oct 24, 2024Updated last year
- OWASP Foundation Web Respository☆36Sep 1, 2021Updated 4 years ago
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆190Aug 11, 2022Updated 3 years ago
- Finds imports that could be exploited, still requires manual analysis.☆29Nov 9, 2022Updated 3 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- Pipe nmap verbose output to a usable format for httpx or host:port notation.☆16Jul 7, 2022Updated 3 years ago
- Jumpstart multiple WebSocket servers quickly☆32Nov 23, 2021Updated 4 years ago
- Automated learning of regexes for DNS discovery☆392Feb 18, 2023Updated 3 years ago
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆38Dec 13, 2020Updated 5 years ago
- ☆108Oct 14, 2021Updated 4 years ago
- ☆10Jan 22, 2016Updated 10 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- Compiles a list of major CDN and WAF subnets.☆67Updated this week
- GraphQL automated security testing toolkit☆333Feb 20, 2024Updated 2 years ago
- Filter and enrich a list of subdomains by level☆210Sep 25, 2023Updated 2 years ago
- A collection of Cobalt Strike Malleable C2 profiles☆36Oct 13, 2020Updated 5 years ago
- experimental wildcard subdomain filtering prototype☆16Aug 5, 2023Updated 2 years ago
- ☆19Jan 31, 2025Updated last year
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆107Jan 30, 2025Updated last year
- ☆154Aug 18, 2023Updated 2 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆187Jun 22, 2022Updated 3 years ago
- Unofficial documentation for the great tool Param Miner☆183Aug 21, 2022Updated 3 years ago
- Rust-based high performance domain permutation generator.☆300Dec 2, 2023Updated 2 years ago
- Tool to check for dependency confusion vulnerabilities in multiple package management systems☆778Aug 19, 2024Updated last year
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- A tool for folks who `git clone` first and ask questions later☆66Sep 12, 2025Updated 5 months ago
- ☆15May 26, 2021Updated 4 years ago
- UUID issues for Burp Suite☆54Jun 2, 2022Updated 3 years ago
- ☆252Sep 28, 2023Updated 2 years ago
- Teamsniper is a tool for fetching keywords in a Microsoft Teams such as (passwords, emails, database, etc.).☆199Sep 19, 2022Updated 3 years ago
- Distribute ordinary bash commands over many systems☆168Aug 29, 2022Updated 3 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- Hardened Proof of Concept of D/Invoke Process Injection malware☆42Jul 23, 2020Updated 5 years ago
- Collection of beacon object files for use with Cobalt Strike to facilitate 🐚.☆185Feb 11, 2021Updated 5 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆64Aug 25, 2020Updated 5 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆206May 11, 2023Updated 2 years ago
- ☆380May 17, 2023Updated 2 years ago