Neg9 / namedropLinks
Fast asynchronous DNS Scanner/bruteforcer
☆18Updated 14 years ago
Alternatives and similar repositories for namedrop
Users that are interested in namedrop are comparing it to the libraries listed below
Sorting:
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 10 years ago
 - ☆44Updated 8 years ago
 - An Intentionally Vulnerable Router Firmware Distribution☆64Updated 10 years ago
 - Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
 - Threatbutt Suite☆37Updated 10 years ago
 - Kojoney2 is a low interaction SSH honeypot written in Python. Based on Kojoney by Jose Antonio Coret☆38Updated 10 years ago
 - Android wireless karma attack detector☆67Updated 10 years ago
 - Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Updated 9 years ago
 - find public zombie hosts for idle scanning, using shodan search and nmap☆24Updated 10 years ago
 - Local and Remote Maltego Rapid Transform Development Framework☆104Updated 9 years ago
 - proof of concept to backdoor files from owncloud encryption module☆17Updated 9 years ago
 - ☆12Updated 8 years ago
 - Cryptowall Tooling & Information☆36Updated 9 years ago
 - ☆16Updated 10 years ago
 - ☆27Updated 8 years ago
 - Exfiltrate files over dns requests using Python and/or Bash☆46Updated 10 years ago
 - iSEC Partners' research publications☆76Updated 9 years ago
 - Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
 - Tools to help detect Hacking Team malware☆79Updated 10 years ago
 - Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Updated 9 years ago
 - VPS infrastructure found in HT dumps☆26Updated 10 years ago
 - Mimosa Framework to abuse EPC functionality on CISCO Routers.☆30Updated 10 months ago
 - Mass scanning and fuzzing library☆48Updated 2 weeks ago
 - Automatically exported from code.google.com/p/burp-extensions☆30Updated 6 years ago
 - A Proof of Concept for the POODLE vulnerability in SSLv3☆78Updated 10 years ago
 - Malware analysis using Docker project☆25Updated 9 years ago
 - Script to perform Linux Memory Diff Analysis Using Volatility☆24Updated 10 years ago
 - Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
 - A TE executable format loader for IDA☆28Updated 10 years ago
 - Automated memory forensics analysis☆33Updated 6 years ago