chadillac / mdns_recon
Multicast DNS and DNS service discovery daemons deployed on various systems across the Internet are misconfigured and reply to queries targeting their unicast addresses, including requests from their WAN interface. These daemons could be leveraged by attackers for sensitive information disclosure and potentially used in DDoS campaigns for reflec…
☆84Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for mdns_recon
- Some scripts for attacks on Tacacs+ protocol☆64Updated 5 years ago
- ☆55Updated 9 years ago
- Enabling 2fac confirmation for newly connected USB devices☆45Updated 8 years ago
- DNS zone transfer research☆57Updated 8 years ago
- A collection of code snippets used in blog posts.☆54Updated 5 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆92Updated 6 years ago
- ssh public host key scanner using shodan☆117Updated 5 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆105Updated 10 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆121Updated 5 years ago
- IPV6 MITM attack tool☆91Updated 11 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 9 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆44Updated 11 years ago
- a linux process hacker tool☆83Updated 5 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆92Updated 3 years ago
- VOIP Security Audit Framework☆107Updated 6 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 15 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 7 years ago
- The SSH Multiplex Backdoor Tool☆62Updated 5 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆47Updated 9 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆196Updated 8 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Python object interface to requests/responses recorded by Burp Suite☆36Updated 4 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆38Updated 5 years ago
- Recording default/backdoor passwords from IoT devices I come across☆38Updated 8 years ago
- A tool for netpens.☆29Updated 5 years ago
- ☆73Updated 5 months ago
- A tool to generate graph and other output from NMAP XML files☆114Updated 5 years ago