Multicast DNS and DNS service discovery daemons deployed on various systems across the Internet are misconfigured and reply to queries targeting their unicast addresses, including requests from their WAN interface. These daemons could be leveraged by attackers for sensitive information disclosure and potentially used in DDoS campaigns for reflec…
☆88Feb 15, 2022Updated 4 years ago
Alternatives and similar repositories for mdns_recon
Users that are interested in mdns_recon are comparing it to the libraries listed below
Sorting:
- XMPP Man-in-the-Middle, quick & dirty☆41Feb 24, 2014Updated 12 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Jul 2, 2014Updated 11 years ago
- http-dir-enum is a tool for finding content that is not linked on a website. Its main use is for finding directories that exist on a serv…☆15Jun 13, 2021Updated 4 years ago
- Repository for proxenet plugins☆14Jun 14, 2016Updated 9 years ago
- See here:☆43Dec 6, 2012Updated 13 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- set of entities for Maltego including common STIX objects and several flavors of kill chain.☆11May 6, 2015Updated 10 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Passive recon / OSINT automation script☆39Nov 3, 2018Updated 7 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Oct 20, 2015Updated 10 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- Various tools, exploits and other short code snippets☆12Dec 25, 2018Updated 7 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 12 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 10 years ago
- Distributed password cracker for operating over high latency networks of loosely coupled hosts.☆13Jul 30, 2013Updated 12 years ago
- [DEPRECATED] Hiccup is a framework that allows the Burp Suite (a web application security testing tool, http://portswigger.net/burp/) to …☆42Jan 2, 2019Updated 7 years ago
- A better SSL cipher checker using gnutls☆28May 17, 2017Updated 8 years ago
- Forked from joomscan-owasp at 26/02/2015 to add new functionality☆14Feb 26, 2015Updated 11 years ago
- Virtual host brute forcer☆22Jan 10, 2014Updated 12 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- HTTP Header Analysis Vulnerability Tool☆115Dec 20, 2020Updated 5 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 13 years ago
- A utility to perform dictionary attacks against the VoIP SIP Register hash☆14Mar 16, 2016Updated 10 years ago
- Pentesting Tools☆22Sep 15, 2025Updated 6 months ago
- Docker Automated Build for Security Testing Tools☆14Apr 8, 2022Updated 3 years ago
- dnshjmon is a free tool to monitor public DNS records and report hijacks☆91Dec 30, 2013Updated 12 years ago
- Some helper tools for network pentest☆20Oct 2, 2013Updated 12 years ago
- phpAudit is a simple shell script that scans PHP files for possible security risks.☆26Apr 7, 2013Updated 12 years ago
- A Python-Based script designed to output stable and screen-scrapable lists of wireless networks☆15Jun 19, 2014Updated 11 years ago
- Wordpress Plugins Scanner it's a semi-automatic white box pentesting/crawler app for WP plugins using RIPS from OWASP.☆14Aug 6, 2013Updated 12 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- DirBuster successor in Erlang☆37Feb 16, 2017Updated 9 years ago
- Automating SQL injection using Burp Proxy Logs and SQLMap☆27Jul 6, 2012Updated 13 years ago
- XSS Tunnel is a standard HTTP proxy which sits on an attacker’s system. XSS Shell is a powerful XSS backdoor, in XSS Shell one can inter…☆88Jan 27, 2015Updated 11 years ago
- Reverser - A Quick Reverse Connection Deployment Script☆12Jun 22, 2012Updated 13 years ago