buglloc / rip
Wildcard DNS with few features
☆13Updated last month
Alternatives and similar repositories for rip:
Users that are interested in rip are comparing it to the libraries listed below
- Packaging audit toolkit using vulners.com vulnerability database☆19Updated 6 years ago
- GitLab CI security tools runner☆17Updated last year
- ☆73Updated 2 years ago
- Certificate Transparency monitor with notifications☆9Updated 7 years ago
- A list of checks with tips for analyzing the security of Android applications☆11Updated 5 years ago
- Asynchronous HTTP pipelining directory buster☆22Updated 4 years ago
- Monitoring for leaks of sensitive information in git repositories☆43Updated last year
- Small DNS Recon utility, allows you to obtain some useful info about NS-servers placed behind relays, firewalls, etc.☆22Updated 7 years ago
- Yandex Cloud CloudQuery source plugin☆19Updated 2 months ago
- Burp Suite plugin for binary search on HTTP parameters☆15Updated 7 years ago
- semgrep rules for flakiness, missed error handling, Lua antipatterns and pitfalls.☆13Updated 2 months ago
- A Go binary that send DNS statistics to a clickhouse database☆11Updated 6 years ago
- Detect Web CMS software type and version in specified path. CMS signatures and actual versions database.☆18Updated 5 years ago
- Signature-free approach library to detect injection and commanding attacks☆86Updated 2 years ago
- Ru-WireGuard reference implementation: WireGuard protocol with GOST crypto algorithms☆16Updated 4 years ago
- QCTF School 2018. Developed with ♥ by Hackerdom team☆12Updated 6 years ago
- Перевод BSIMM (https://www.bsimm.com) на русский язык☆22Updated 2 years ago
- lightweight CVE search☆21Updated last year
- Tasks from Hack Battle by SPbCTF at PHDays 9☆10Updated 3 years ago
- ☆10Updated 9 years ago
- ☆18Updated 7 years ago
- Examples for Advanced Web Hacking Workshop☆35Updated 5 years ago
- Proof-of-Concept python script that implements DNS spoofing attack in Kubernetes environment from a pod located on a Worker server☆14Updated 3 years ago
- Library and example applications for using/abusing the information-leaky L2Trace service on Cisco switches. PSIRT Advisory: cisco-sa-2019…☆4Updated last year
- UDP port knocking suite with HMAC-PSK authentication.☆23Updated 4 years ago
- Freki is a tool to manipulate packets in usermode using NFQUEUE and golang.☆58Updated last year
- Artifacts of the USENIX Security 2022 paper "Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope"☆17Updated last month
- ☆13Updated 4 years ago
- Flood Shield is a very fast http flood blocker☆30Updated 9 years ago