Data exfiltration using DNS
☆26Dec 28, 2019Updated 6 years ago
Alternatives and similar repositories for exodus
Users that are interested in exodus are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- RipGit - Scanner/Scraper of git source deployed☆15Jan 17, 2019Updated 7 years ago
- pugrecon is a bash script for automatic recon of common vulnerabilities, misconfigurations and files on domains.☆25Mar 18, 2021Updated 5 years ago
- client & server that can be used to transfer data from a client to a DNS server using DNS only.☆11Mar 30, 2021Updated 5 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆38Oct 19, 2025Updated 6 months ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Golang tool to scan hosts for SMB version and signing status☆15Nov 19, 2024Updated last year
- ☆16Dec 12, 2025Updated 4 months ago
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Jan 9, 2022Updated 4 years ago
- Python多线程和异步协程扫描速度比较☆19May 13, 2020Updated 5 years ago
- A collection of hacks and one-off scripts☆10Jan 18, 2021Updated 5 years ago
- HTTP requests of FrontPage expolit☆26Dec 19, 2013Updated 12 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆29Aug 11, 2023Updated 2 years ago
- CTF platform we wrote and used for justCTF 2019☆12Jun 25, 2022Updated 3 years ago
- No computer is secure, mate. Brute force SSH really easily.☆15Jan 2, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆16Aug 29, 2023Updated 2 years ago
- A C-based checksec without readelf or grep dependance.☆11Apr 20, 2021Updated 5 years ago
- Native Powers Talk demos☆18Jan 30, 2026Updated 3 months ago
- Hooking Heavens Gate in a weekend☆13Jan 1, 2022Updated 4 years ago
- ☆16Jul 21, 2018Updated 7 years ago
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- Java code for CFS2160 Programming Stream 2019/20☆10Jan 16, 2020Updated 6 years ago
- ☆16Sep 9, 2021Updated 4 years ago
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆11Dec 10, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- ☆18Aug 15, 2025Updated 8 months ago
- event shipper for Carbon Black Defense notifications☆10Feb 25, 2023Updated 3 years ago
- This tool was created as a Proof of Concept to reveal the threats related to web service misconfiguration using CloudFlare as reverse pr…☆14Feb 20, 2023Updated 3 years ago
- Query the 'PublicWWW' Source Code Search Engine in R☆13May 2, 2018Updated 8 years ago
- A brief list of all the red teaming scenarios that can be easily used to validate your current company infrastructure. Scenarios are comp…☆18Jul 26, 2024Updated last year
- ☆19Apr 21, 2026Updated last week
- AvBuster The stress Tester for your Anti Malware solutions☆41Feb 12, 2021Updated 5 years ago
- Attributes sent to the server should be checked. This module allows you to cast data to its expected type before processing.☆13Jul 21, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Offensive Terraform module which creates EC2 instance and reverse shell from an EC2 instance to attacker machine.☆16Sep 19, 2020Updated 5 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆46Nov 1, 2021Updated 4 years ago
- Just a place to share some things I've written while participating in Hack The Box.☆18Jun 5, 2020Updated 5 years ago
- ☆15Aug 17, 2025Updated 8 months ago
- parse ffuf & map endpoints to wordlists☆21Feb 25, 2021Updated 5 years ago
- Tool to acquire netNTLM hashes on a local machine wihtout network traffic☆13May 18, 2018Updated 7 years ago
- Google Maps API checker☆82Feb 26, 2026Updated 2 months ago