Dirty bash script to obtain hosts given an IP address
☆35Jan 25, 2021Updated 5 years ago
Alternatives and similar repositories for ip2hosts
Users that are interested in ip2hosts are comparing it to the libraries listed below
Sorting:
- burp插件开发笔记☆11Dec 26, 2021Updated 4 years ago
- Insecure Deserialization, PDF and lab☆18Nov 19, 2019Updated 6 years ago
- ☆45Nov 5, 2018Updated 7 years ago
- This is a GUI for the projet https://github.com/PowerShellEmpire/Empire☆16Jun 19, 2017Updated 8 years ago
- ☆19Oct 4, 2021Updated 4 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- Wingkalabs (Linux) Wingkalabs es una máquina Virtual Linux intencionalmente vulnerable. Esta máquina virtual se puede utilizar para real…☆22Mar 14, 2018Updated 7 years ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- Endpoint monitor tool☆21Sep 16, 2020Updated 5 years ago
- Fast Endpoint Scanner☆55Dec 23, 2020Updated 5 years ago
- A Burp extension to show the Collaborator client in a tab☆24Dec 23, 2022Updated 3 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Sep 20, 2014Updated 11 years ago
- A very vulnerable implementation of a GraphQL API.☆61Nov 12, 2021Updated 4 years ago
- IDOR bypass fuzz 权限绕过burp 插件 fuzz (shiro 等)☆27Sep 1, 2021Updated 4 years ago
- qsinject (Query String Inject) is a tool that allows you to quickly substitute query string values with regex matches, one-at-a-time.☆30May 6, 2020Updated 5 years ago
- Spring Boot Actuator (jolokia) XXE/RCE☆23Mar 10, 2019Updated 6 years ago
- Keye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will m…☆99Dec 30, 2019Updated 6 years ago
- unicode abnormalizer to takes a unicode string and abnormalizes it by character replacment☆26Jun 27, 2020Updated 5 years ago
- Rethinking the User Interface of AI☆32Updated this week
- Updated Android biometric bypass script for Frida (from Kamil Breński, Krzysztof Pranczk and Mateusz Fruba, August 2019). The code resolv…☆42Jan 31, 2023Updated 3 years ago
- A list of threat sinks used in the manual security source code review for application security☆76May 9, 2023Updated 2 years ago
- URL Screenshot Utility☆28May 22, 2023Updated 2 years ago
- TProx is a fast reverse proxy path traversal detector and directory bruteforcer.☆30Sep 16, 2021Updated 4 years ago
- ☆13Nov 5, 2024Updated last year
- ☆11Sep 23, 2025Updated 5 months ago
- ident-user-enum is a simple PERL script to query the ident service (113/TCP) in order to determine the owner of the process listening on …☆37May 29, 2015Updated 10 years ago
- ☆37Sep 12, 2018Updated 7 years ago
- ☆41Jul 4, 2018Updated 7 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- AWS S3 Sensitive Data Search☆35Jan 16, 2022Updated 4 years ago
- ☆33Jun 27, 2022Updated 3 years ago
- Simple skeleton for a CPP DLL☆66Jan 11, 2020Updated 6 years ago
- An simplest PE parser, which list all import and export entries☆12Oct 11, 2018Updated 7 years ago
- 存放投稿里的一些文件☆11Oct 31, 2020Updated 5 years ago
- 一个基于JSRPC实现的自动解密代理框架☆13Sep 28, 2023Updated 2 years ago
- ☆46Dec 30, 2018Updated 7 years ago
- ☆16May 13, 2021Updated 4 years ago
- The knife of the Admin & Security auditor☆42Feb 12, 2020Updated 6 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago