ResearchandDestroy / DorXNG
Next Generation DorX. Built by Dorks, for Dorks. π€
β98Updated last year
Alternatives and similar repositories for DorXNG:
Users that are interested in DorXNG are comparing it to the libraries listed below
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written β¦β130Updated 6 months ago
- Automate Scoping, OSINT and Recon assessments.β94Updated 3 weeks ago
- Discover and monitor internet assets using favicon hashes across search engines.β157Updated 2 weeks ago
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and othersβ77Updated last year
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspacesβ155Updated 7 months ago
- The perfect butler for pentesters, bug-bounty hunters and security researchersβ88Updated 11 months ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.β38Updated last year
- A Slack bot phishing framework for Red Teaming exercisesβ164Updated 9 months ago
- A curated list wordlists for bruteforcing and fuzzingβ80Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving conβ¦β125Updated 6 months ago
- Everything and anything related to password sprayingβ128Updated 8 months ago
- Mining URLs from Wayback Machine for bug hunting/fuzzing/further probingβ56Updated last year
- β61Updated 9 months ago
- Discovering Typo Squatting on your domains!β64Updated 6 months ago
- Tools and Resources for Physical Security Red Teamingβ27Updated 3 weeks ago
- Nuclei (https://github.com/projectdiscovery/nuclei) templates for extracting juicy info from web pagesβ177Updated last year
- β64Updated last year
- A WLAN red team framework.β149Updated 3 months ago
- β185Updated 2 years ago
- Nuclei templates for honeypots detection.β196Updated last year
- β26Updated 2 years ago
- Script designed to identify CanaryTokens within Microsoft Office documents and Acrobat Reader PDF (docx, xlsx, pptx, pdf).β110Updated last year
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is doneβ¦β15Updated 6 months ago
- β53Updated last year
- Pentest/Red Team: Resources, repos and scripts.β65Updated this week
- Generate graphs and charts based on password cracking resultβ156Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusingβ¦β98Updated last year
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2β¦β83Updated last year
- β50Updated last year
- Simple chrome extension for full name extraction and conversion to emails/usernames. Utilizes the 'people' tab of the target company on Lβ¦β23Updated 2 months ago