chadillac / mdns_recon
Multicast DNS and DNS service discovery daemons deployed on various systems across the Internet are misconfigured and reply to queries targeting their unicast addresses, including requests from their WAN interface. These daemons could be leveraged by attackers for sensitive information disclosure and potentially used in DDoS campaigns for reflec…
☆84Updated 3 years ago
Alternatives and similar repositories for mdns_recon:
Users that are interested in mdns_recon are comparing it to the libraries listed below
- Some scripts for attacks on Tacacs+ protocol☆64Updated 5 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 7 years ago
- IPV6 MITM attack tool☆92Updated 11 years ago
- ☆57Updated 10 years ago
- ssh public host key scanner using shodan☆117Updated 6 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 15 years ago
- Universal Plug and Fuzz☆41Updated 5 years ago
- tundeep☆42Updated 5 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- DNS Sub-domain brute forcer, in Python + gevent☆50Updated 8 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆105Updated 10 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆62Updated 9 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 11 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆60Updated 4 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- DNS zone transfer research☆58Updated 8 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆123Updated 6 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆44Updated 11 years ago
- Automated HaveIbeenPwned lookups using theharvester results☆49Updated 7 years ago
- Python object interface to requests/responses recorded by Burp Suite☆36Updated 5 years ago
- Enabling 2fac confirmation for newly connected USB devices☆45Updated 8 years ago
- use ambiguous HTTP to circumvent security systems☆94Updated last year
- Proof-of-concept exploit code for CVE-2016-5696☆73Updated 8 years ago
- ☆53Updated 8 years ago
- A tool to generate graph and other output from NMAP XML files☆116Updated 6 years ago
- A collection of code snippets used in blog posts.☆54Updated 5 years ago
- Tools developed to test the Redirect to SMB issue☆83Updated 9 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Updated 8 years ago