KarimPwnz / dns-exfilView external linksLinks
Open a DNS server that knows no records but records every request. Used for DNS exfiltration.
☆69Jan 13, 2022Updated 4 years ago
Alternatives and similar repositories for dns-exfil
Users that are interested in dns-exfil are comparing it to the libraries listed below
Sorting:
- Tool for making it easy to collect dns results from the CLI☆40Aug 14, 2024Updated last year
- ☆13Feb 18, 2022Updated 3 years ago
- Get URLs from the Wayback Machine. Able to handle large outputs.☆35Sep 15, 2023Updated 2 years ago
- Get all the CNs from a list of domains☆45Aug 17, 2021Updated 4 years ago
- JXA script for Mythic that prints the TCC.db☆15Apr 18, 2021Updated 4 years ago
- Detects request smuggling via HTTP/2 downgrades.☆94Jul 30, 2022Updated 3 years ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Apr 22, 2021Updated 4 years ago
- ☆15Jul 20, 2022Updated 3 years ago
- ☆26Apr 10, 2023Updated 2 years ago
- Objective C dylibHijackScanner and analysis tool☆38Jul 12, 2023Updated 2 years ago
- Fetch web pages using headless Chrome, storing all fetched resources including JavaScript files. Run arbitrary JavaScript on many web pag…☆528Apr 23, 2025Updated 9 months ago
- Send notifications on different channels such as Slack, Telegram, Discord etc.☆39Jan 12, 2026Updated last month
- Tiny library to parse the subdomain, domain, and tld extension from a host string☆23Apr 1, 2022Updated 3 years ago
- Mythic Developer Series: Workshop Golang Agent☆26Jun 27, 2023Updated 2 years ago
- ☆27Aug 8, 2021Updated 4 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 3 years ago
- Dotmil subdomain discovery tool that scrapes domains from official DoD website directories and certificate transparency logs☆95Jan 21, 2021Updated 5 years ago
- Collection of rules for Static Application Security Testing (SAST) with Semgrep☆12Apr 16, 2025Updated 10 months ago
- Machine Learning basics with phishing dataset☆10Apr 19, 2021Updated 4 years ago
- Check for know iframeBuster XSS☆12Sep 25, 2024Updated last year
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 3 years ago
- Bugbounty scope tool☆332Mar 5, 2025Updated 11 months ago
- Identify virtual hosts by similarity comparison☆137Aug 12, 2024Updated last year
- A compilation of network scanning strategies to find vulnerable devices☆73Nov 6, 2022Updated 3 years ago
- ☆146Apr 25, 2024Updated last year
- ☆54Nov 5, 2024Updated last year
- Extract SSL certificate data (Subject Name, Subject Alt Names, Organisation)☆42Nov 10, 2025Updated 3 months ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆48Apr 15, 2021Updated 4 years ago
- Rust program for interfacing with the gigabyte driver to gain access to powerful primitives such as arbitrary kernel memcpy.☆17Nov 26, 2022Updated 3 years ago
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆15Dec 3, 2020Updated 5 years ago
- ☆12Mar 27, 2024Updated last year
- Reverse engineers GQL Schema and generates template payloads☆46Apr 5, 2019Updated 6 years ago
- ☆76Nov 30, 2020Updated 5 years ago
- A Go implementation of dirsearch.☆43Mar 10, 2019Updated 6 years ago
- ☆105Oct 18, 2020Updated 5 years ago
- A PowerShell script to prevent Sysmon from writing its events☆16Apr 23, 2020Updated 5 years ago
- IIS shortname scanner + bruteforce☆54Feb 18, 2024Updated last year