DNS Sub-domain brute forcer, in Python + gevent
☆50Dec 9, 2016Updated 9 years ago
Alternatives and similar repositories for dnsbrute
Users that are interested in dnsbrute are comparing it to the libraries listed below
Sorting:
- Python Process Injection PoC Code from my SteelCon talk in 2014☆60Aug 7, 2014Updated 11 years ago
- A scalable framework for binary analysis in a containered environment.☆13May 20, 2019Updated 6 years ago
- Some wordpress user enumeration scripts.☆38Dec 21, 2016Updated 9 years ago
- Simple php backdoor based on extension☆22Feb 12, 2015Updated 11 years ago
- Moovbox Mismanagement Utilities☆15Mar 21, 2015Updated 10 years ago
- SMS Phishing Tools☆79Jul 19, 2017Updated 8 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- Find exploitable PHP files by parameter fuzzing and function call tracing☆72Jan 24, 2017Updated 9 years ago
- Simple php backdoor based on extension☆73Aug 20, 2014Updated 11 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Jan 12, 2017Updated 9 years ago
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- Run executables from memory, over the network, on Windows, Linux, OpenVMS... routers... spaceships... toasters etc.☆284Sep 28, 2017Updated 8 years ago
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Jul 12, 2016Updated 9 years ago
- RatHole is a unix backdoor which compiles cleanly on standard linux and openbsd (probably other bsd flavours also) without addicional lib…☆37May 20, 2013Updated 12 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- WAF Exploitation Framework☆13Aug 25, 2023Updated 2 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Multithreaded DNS recursive host brute-force tool☆13May 11, 2015Updated 10 years ago
- SSH Based Remote Administration Tool☆103Jul 9, 2015Updated 10 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- ☆17Sep 14, 2017Updated 8 years ago
- ☆45Jul 18, 2016Updated 9 years ago
- ssh public host key scanner using shodan☆118Mar 11, 2019Updated 6 years ago
- windows create process with a dll load first time via LdrHook☆31Oct 21, 2016Updated 9 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Dec 16, 2022Updated 3 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Jul 8, 2015Updated 10 years ago
- LD_PRELOAD rootkit utils☆16Jul 3, 2015Updated 10 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆19Apr 19, 2023Updated 2 years ago
- z/OS Mainframe TPX panel account enumerator and brute forcer☆20Jan 10, 2018Updated 8 years ago
- ☆18Jan 3, 2016Updated 10 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Jun 10, 2014Updated 11 years ago
- Quick and dirty .net console app for querying mssql servers.☆24Aug 30, 2018Updated 7 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Sep 23, 2014Updated 11 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Nov 7, 2017Updated 8 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆59Dec 10, 2014Updated 11 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Sep 6, 2015Updated 10 years ago
- Fuzzer for PHP internal functions☆31Mar 9, 2012Updated 13 years ago