chadillac / mdns_reconLinks
Multicast DNS and DNS service discovery daemons deployed on various systems across the Internet are misconfigured and reply to queries targeting their unicast addresses, including requests from their WAN interface. These daemons could be leveraged by attackers for sensitive information disclosure and potentially used in DDoS campaigns for reflec…
☆85Updated 3 years ago
Alternatives and similar repositories for mdns_recon
Users that are interested in mdns_recon are comparing it to the libraries listed below
Sorting:
- IPV6 MITM attack tool☆92Updated 11 years ago
- DNS zone transfer research☆59Updated 8 years ago
- Some scripts for attacks on Tacacs+ protocol☆64Updated 5 years ago
- ☆57Updated 10 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Updated 11 years ago
- tundeep☆42Updated 5 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- Enabling 2fac confirmation for newly connected USB devices☆45Updated 8 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆106Updated 10 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- Mass zone transfer python script☆16Updated 9 years ago
- ☆32Updated 9 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated last year
- A tool to catch spoofed NBNS responses.☆50Updated 6 years ago
- TCP session interception and injection framework☆55Updated 14 years ago
- DNS Sub-domain brute forcer, in Python + gevent☆50Updated 8 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 11 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆125Updated 6 years ago
- Tools developed to test the Redirect to SMB issue☆84Updated 10 years ago
- Pcap importer for Burp☆107Updated 3 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- This tool is based on regex with effective standards for detecting phishing sites in real time using certstream and can also detect puny…☆81Updated 6 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- ☆54Updated 8 years ago
- ☆143Updated 8 years ago
- ☆57Updated 4 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Updated 9 years ago