Automatic DNS Enumeration Tool with various functions
☆13Sep 28, 2021Updated 4 years ago
Alternatives and similar repositories for free-dns-enum
Users that are interested in free-dns-enum are comparing it to the libraries listed below
Sorting:
- Free and open cyber-security auditing tool with collective intelligence☆21Nov 3, 2019Updated 6 years ago
- Monitoring filesystems events with inotify on Linux and execute tasks☆13Apr 3, 2023Updated 2 years ago
- Main branch here, feel free to branch and edit, take a look at issues for updates on things I am planning to work on☆22Dec 22, 2025Updated 3 months ago
- Free and open NMAP NSE script to query vulnerabilities via the cve-search.org API.☆247Nov 17, 2019Updated 6 years ago
- Offline Security Focus Database☆31Dec 24, 2012Updated 13 years ago
- Set of IDA Pro scripts for parsing GoLang types information stored in compiled binary☆28Jul 4, 2020Updated 5 years ago
- CVE-2020-36184 && Jackson-databind RCE☆15Jan 11, 2021Updated 5 years ago
- Burp Suite JSON/JS-Beautifier☆14Sep 17, 2019Updated 6 years ago
- Scripts that can generate gopher payload.☆13Jun 26, 2020Updated 5 years ago
- Simplified NAT Slipstream server and client☆22Dec 4, 2020Updated 5 years ago
- Kernel file/process/object tool☆69Aug 4, 2021Updated 4 years ago
- RCE Exploit for Gitlab < 13.9.4☆51Jun 4, 2021Updated 4 years ago
- ☆11May 30, 2021Updated 4 years ago
- CVE-2017-10366: Oracle PeopleSoft 8.54, 8.55, 8.56 Java deserialization exploit☆25Sep 4, 2018Updated 7 years ago
- Bypass cobaltstrike beacon config scan☆84May 24, 2021Updated 4 years ago
- CVE-2021-3560 Local PrivEsc Exploit☆81Jun 12, 2021Updated 4 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- Cobalt strike custom 404 page☆66Apr 5, 2020Updated 5 years ago
- Basic Dart reverse shell code☆21Nov 10, 2023Updated 2 years ago
- Online test is available 👉☆12Updated this week
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- When I'm doing my job I'm trying to set my working place as efficient and useful as it's possible. Bash terminal is my main everyday prog…☆10May 19, 2023Updated 2 years ago
- StenographyShellcodeLoader☆43Sep 8, 2020Updated 5 years ago
- Stats about HTTP response security headers usage mentioned by the OSHP.☆17Jan 25, 2026Updated last month
- Decrypt stored WinSCP Passwords.☆24May 4, 2015Updated 10 years ago
- Dependencies with Log4j2 Checklist☆35Dec 14, 2021Updated 4 years ago
- Metasploit Framework☆29Mar 12, 2026Updated last week
- C2Matrix Automation☆15Sep 10, 2023Updated 2 years ago
- Harvis is designed to automate your C2 Infrastructure.☆106Jul 10, 2022Updated 3 years ago
- Automatic cloud backup of Kali Linux data☆13Feb 27, 2020Updated 6 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- A sample web application using Node.js, Express and Angular that is vulnerable to common security vulnerabilities.☆10Jun 15, 2023Updated 2 years ago
- ☆14Jul 18, 2019Updated 6 years ago
- Bash scripts that help you audit the system administration on a Linux server☆11Jun 26, 2017Updated 8 years ago
- Tool Desgined to remove unwanted apps from Xioami Devices.☆13Oct 22, 2023Updated 2 years ago
- A Beacon Object File (BOF) for Cobalt Strike which uses direct system calls to enable WDigest credential caching.☆220May 3, 2023Updated 2 years ago
- Linux HOWTO's by 07-Jul-2012☆12Feb 8, 2017Updated 9 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Jun 28, 2023Updated 2 years ago
- Vagrant files to bootstrap VM for CTFs☆11Aug 21, 2016Updated 9 years ago