NotSoSecure / udp-hunterLinks
Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols
☆115Updated 5 years ago
Alternatives and similar repositories for udp-hunter
Users that are interested in udp-hunter are comparing it to the libraries listed below
Sorting:
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆92Updated 6 years ago
- Shell script for testing DNS zone transfer (AXFR query) on domains and subdomains recursively.☆50Updated 4 years ago
- Scripts and tools for AWS Pentest☆53Updated 4 years ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆137Updated 5 years ago
- ☆48Updated 4 years ago
- Oracle Database Penetration Testing Reference (10g/11g)☆36Updated 6 years ago
- An epic web shell☆85Updated last month
- TheCl0n3r will allow you to download and manage your git repositories.☆51Updated 4 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Updated 3 years ago
- A Burp extension to detect and exploit versions of Telerik Web UI vulnerable to CVE-2017-9248.☆98Updated 6 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago
- Test a host for susceptibility to CVE-2019-19781☆108Updated 4 years ago
- ☆18Updated 6 years ago
- Burp Suite Importer - Connect to multiple web servers while populating the sitemap.☆48Updated 5 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆81Updated 6 years ago
- learning case to prepare OSWE☆37Updated 5 years ago
- A tool to evaluate Content Security Policies.☆72Updated 5 years ago
- Asynchronous wordlist based DKIM scanner☆58Updated 4 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- A Report Generation Tool for Security Assessment☆65Updated 6 years ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 3 years ago
- Parse .nessus file(s) and shows output in interactive UI☆154Updated 2 months ago
- subdomain bruteforce list☆101Updated 9 months ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆102Updated 4 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆96Updated 6 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 6 years ago
- Words list generator to crack security tokens☆110Updated 5 years ago
- ☆92Updated 2 years ago
- Offensive Security recon tool☆92Updated 3 years ago