cmeister2 / eidolon
A DNS server that balances queries amongst a number of public DNS servers
☆11Updated 7 years ago
Alternatives and similar repositories for eidolon:
Users that are interested in eidolon are comparing it to the libraries listed below
- Terraform configuration to build a Burp Private Collaborator Server☆29Updated 6 years ago
- Zone transfers for rwhois☆20Updated 5 years ago
- This repository contains hit lists to use for web application content discovery.☆11Updated 7 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- Fuzzer for finding Open Mail Relays☆14Updated 4 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- ☆14Updated 7 years ago
- An information gathering tool to collect git emails in version control host services☆11Updated 5 years ago
- A collection of scripts made duing my personal research☆28Updated 6 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13Updated 6 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Updated 8 years ago
- Burp plugin that clusters responses to show an overview of received responses☆15Updated 5 years ago
- Tools for analysing the forward DNS data set published at https://scans.io/study/sonar.fdns_v2☆17Updated 7 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 7 years ago
- ☆20Updated 5 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 5 years ago
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆22Updated 6 years ago
- A bunch of tricks and configs to configure a work environment for web pentesting☆12Updated 6 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Updated 5 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- Scan for open S3 buckets and dump☆36Updated 6 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Updated 6 years ago
- ☆11Updated 6 years ago
- ☆11Updated 7 years ago