Neg9 / namedrop
Fast asynchronous DNS Scanner/bruteforcer
☆18Updated 13 years ago
Alternatives and similar repositories for namedrop:
Users that are interested in namedrop are comparing it to the libraries listed below
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- ☆12Updated 8 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- Some yara rules and tools☆16Updated 11 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆44Updated 11 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆25Updated 9 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 7 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- A better SSL cipher checker using gnutls☆28Updated 7 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- MITM 'n' BDF☆10Updated 9 years ago
- Volatility plugin to extract FileVault 2 VMK's☆50Updated 3 years ago
- A TE executable format loader for IDA☆28Updated 9 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆17Updated 8 years ago
- everything that does not fit elsewhere☆12Updated 7 years ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Updated 9 years ago
- ☆27Updated 7 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 10 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆69Updated 10 years ago
- Script to perform Linux Memory Diff Analysis Using Volatility☆24Updated 9 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- Websocket based egress tester☆20Updated 8 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆36Updated 9 years ago
- Malware Analysis Zoo☆25Updated 8 years ago
- NMAP Patches and NSE Scripts☆19Updated 11 years ago