NullArray / AmpliSpy
Check local or remote list of DNS servers for suitability in DNS Amplification DoS.
☆47Updated 5 years ago
Alternatives and similar repositories for AmpliSpy:
Users that are interested in AmpliSpy are comparing it to the libraries listed below
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 6 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 6 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- Simple security surveillance script for linux distributions.☆58Updated 8 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆57Updated last year
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- Red Login: SSH Brute-force Tools☆102Updated 6 years ago
- DNS Sub-domain brute forcer, in Python + gevent☆50Updated 8 years ago
- pentest toolbox☆28Updated 2 years ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆21Updated 8 years ago
- web information gathering / Grab links☆42Updated 5 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆44Updated 8 years ago
- Unofficial WhatCMS API package☆42Updated 3 years ago
- Wardriving ekoparty☆14Updated 7 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 7 years ago
- Crawl Google and Bing to find emails, subdomains and URLs associated to a target domain☆48Updated 3 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- Search bing with python☆12Updated 10 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 3 years ago
- Simple Webshell Scanner☆50Updated 10 years ago
- ssh session type for metasploit☆98Updated last year
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 7 years ago
- Quick script written for sorting and categorizing Shodan API keys acquired via scraping the internet.☆55Updated last year
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆37Updated 4 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Go command line app to exploit file upload vulnerability☆12Updated 7 years ago
- Terminal Ip Lookup Tool☆56Updated 10 years ago
- DNS Enumeration with Asynchronicity☆46Updated 6 years ago