chadillac / mdns_reconLinks
Multicast DNS and DNS service discovery daemons deployed on various systems across the Internet are misconfigured and reply to queries targeting their unicast addresses, including requests from their WAN interface. These daemons could be leveraged by attackers for sensitive information disclosure and potentially used in DDoS campaigns for reflec…
☆87Updated 3 years ago
Alternatives and similar repositories for mdns_recon
Users that are interested in mdns_recon are comparing it to the libraries listed below
Sorting:
- IPV6 MITM attack tool☆92Updated 12 years ago
- Some scripts for attacks on Tacacs+ protocol☆65Updated 6 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- A collection of code snippets used in blog posts.☆54Updated 3 months ago
- ☆58Updated 11 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 11 years ago
- Rogue AP killer☆92Updated 7 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆66Updated 9 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆107Updated 11 years ago
- Parse nmap's XML output files and insert them into an SQLite database☆120Updated 5 years ago
- DNS zone transfer research☆59Updated 9 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 9 years ago
- proxy poc implementation of STARTTLS stripping attacks☆170Updated 4 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Updated 9 years ago
- A Upnp exploitation tool.☆106Updated 6 years ago
- Simple website to display the LAN status based on a nmap scan☆58Updated 2 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- Automated HaveIbeenPwned lookups using theharvester results☆50Updated 7 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Updated 9 years ago
- A tool to generate graph and other output from NMAP XML files☆116Updated 6 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆61Updated 5 years ago
- ssh public host key scanner using shodan☆118Updated 6 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Proof of Concept - Utilize misconfigured newsletter forms to spam / deny service to an inbox☆54Updated 4 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆125Updated 6 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 16 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Updated 9 years ago
- Wi-Fi Scan Visualizer by Pentester Academy☆58Updated 10 years ago
- tundeep☆42Updated 6 years ago