chadillac / mdns_reconLinks
Multicast DNS and DNS service discovery daemons deployed on various systems across the Internet are misconfigured and reply to queries targeting their unicast addresses, including requests from their WAN interface. These daemons could be leveraged by attackers for sensitive information disclosure and potentially used in DDoS campaigns for reflec…
☆85Updated 3 years ago
Alternatives and similar repositories for mdns_recon
Users that are interested in mdns_recon are comparing it to the libraries listed below
Sorting:
- tundeep☆42Updated 5 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆125Updated 6 years ago
- Repository containing many useful scripts☆74Updated 3 years ago
- DNS zone transfer research☆59Updated 8 years ago
- A collection of code snippets used in blog posts.☆54Updated 5 years ago
- LNHG - Mass Web Fingerprinter☆61Updated 9 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- Enabling 2fac confirmation for newly connected USB devices☆45Updated 8 years ago
- IPV6 MITM attack tool☆92Updated 11 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- A python implementation of a grep friendly ftrace wrapper☆80Updated 6 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- ☆74Updated 2 years ago
- TFTP Theft is a tool which allows one to quickly scan/bruteforce a tftp server for files and download them instantly☆68Updated 9 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Updated 9 years ago
- Internet data processing tools☆54Updated 4 years ago
- proxy poc implementation of STARTTLS stripping attacks☆167Updated 3 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago
- ☆57Updated 4 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 11 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Updated 10 years ago
- Python object interface to requests/responses recorded by Burp Suite☆37Updated 5 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- ☆73Updated last year
- ☆32Updated 9 years ago
- ☆57Updated 10 years ago
- [deprecated] see README☆42Updated 5 years ago