Passive DNS V2
☆60Mar 27, 2014Updated 11 years ago
Alternatives and similar repositories for pDNS2
Users that are interested in pDNS2 are comparing it to the libraries listed below
Sorting:
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20May 4, 2016Updated 9 years ago
- Tool for check the cookie flag in multiple sites☆28Dec 30, 2015Updated 10 years ago
- Common Industrial Protocol based device scanner over the internet☆24Mar 10, 2016Updated 9 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Sep 12, 2016Updated 9 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Search exploits in multiple exploit databases!☆85Oct 1, 2020Updated 5 years ago
- ☆305May 28, 2017Updated 8 years ago
- a Malware/Threat Analyst Desktop☆89Aug 25, 2015Updated 10 years ago
- [Exploit] vBulletin 5.1.x - PreAuth Remote Code Execution☆20Aug 27, 2021Updated 4 years ago
- Hakabana monitoring tool using Haka, ElastcSearch and Kibana☆20Sep 24, 2014Updated 11 years ago
- based on search engine and get the valid infomation to test the vulnerability☆16Jun 16, 2016Updated 9 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Aug 2, 2016Updated 9 years ago
- --= Xt9 - Anti - Rootkit =-- beta v0.11 by xti9er☆15Dec 16, 2020Updated 5 years ago
- Simple vulnerability scanning framework☆51Oct 29, 2016Updated 9 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆56Oct 8, 2016Updated 9 years ago
- Marfil is an extension of the Aircrack-ng suite, used to assess WiFi network security. It allows to split the work of performing long run…☆54Apr 17, 2016Updated 9 years ago
- ☆12Dec 14, 2016Updated 9 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Jan 21, 2022Updated 4 years ago
- CSRF Scanner Extension for Burp Suite Pro☆20Jun 5, 2018Updated 7 years ago
- Automate NMAP Scans and Generate Custom Nessus Policies Automatically☆147May 10, 2016Updated 9 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Jun 4, 2013Updated 12 years ago
- Materials for 44con 2014 CANAPE Workshop☆23Sep 11, 2014Updated 11 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- ☆83Feb 3, 2017Updated 9 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- ☆10Jan 4, 2015Updated 11 years ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆556May 9, 2023Updated 2 years ago
- Simple high-interactive client honeypot☆25Oct 15, 2017Updated 8 years ago
- Next Generation Firewall Audit and Bypass Tool☆266Apr 24, 2017Updated 8 years ago
- Self contained cross platform DNS recon tool☆187Jul 20, 2017Updated 8 years ago
- Updated version of SWFIntruder☆27Aug 16, 2016Updated 9 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- A collection of useful scripts for penetration testers☆83Oct 23, 2012Updated 13 years ago
- DHCP option injector☆42Jul 7, 2020Updated 5 years ago
- like hidden-tear with libsodium☆21Aug 20, 2015Updated 10 years ago
- Graphical analysis of PDF structure.☆13Jan 9, 2017Updated 9 years ago
- Feed for verious malicious IPs such as malware and botnets☆12Jun 20, 2016Updated 9 years ago
- Summit Route End Point Protection - Server code☆11Apr 10, 2016Updated 9 years ago