david3107 / squatm3gatorView external linksLinks
Squatm3gator is a complete web solution based on the python tool squatm3, designed to enumerate available domains generated modifying the original domain name through different cybersquatting techniques
☆32Jan 21, 2026Updated 3 weeks ago
Alternatives and similar repositories for squatm3gator
Users that are interested in squatm3gator are comparing it to the libraries listed below
Sorting:
- Squatm3 is a python tool designed to enumerate available domains generated modifying the original domain name through different technique…☆43Dec 11, 2025Updated 2 months ago
- ☆17Sep 14, 2017Updated 8 years ago
- GNU/Linux version of the https://github.com/inquisb/icmpsh slave☆22Feb 11, 2020Updated 6 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆25Oct 25, 2020Updated 5 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆23Jan 7, 2018Updated 8 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆29Jun 22, 2022Updated 3 years ago
- ☆27Jan 27, 2026Updated 2 weeks ago
- This repository contains some details about abusing outlook.☆27Aug 17, 2018Updated 7 years ago
- Learn how to get a reverse shell from JIRA application server☆24Dec 2, 2018Updated 7 years ago
- Find alpha, manage positions in Polymarket☆34Updated this week
- Library of traffic redirectors☆26Apr 7, 2020Updated 5 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 6 years ago
- Interface for Image-Related Deep Learning Models (E.g. NSFW, MAYBE and SFW)☆33Apr 15, 2022Updated 3 years ago
- ☆10Apr 29, 2023Updated 2 years ago
- Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a sum…☆13Apr 17, 2020Updated 5 years ago
- Extended Process List (Search functionality)☆29Jan 23, 2021Updated 5 years ago
- 高対話型ハニーポット☆28Mar 10, 2019Updated 6 years ago
- A fileless Windows keylogger that exfils via DNS.☆32Apr 21, 2017Updated 8 years ago
- Source Code for 'Introducing Blockchain with Java' by Spiro Buzharovski☆12Feb 24, 2022Updated 3 years ago
- Architecture of Twint scrapper which allow download tweets on many instances without api restrictions☆10Nov 30, 2020Updated 5 years ago
- Advance phishing tool☆13Sep 25, 2020Updated 5 years ago
- A version support custom range scanning and multi address scanning.☆10Mar 5, 2024Updated last year
- A tool for recursively scanning websites for defacements☆10Nov 22, 2022Updated 3 years ago
- Ayashige provides a list of suspicious newly updated domains as a JSON feed☆38Jun 29, 2024Updated last year
- New Found 0-days!☆36Dec 4, 2019Updated 6 years ago
- A small script to find the exact Geo-location of IP☆38Nov 21, 2022Updated 3 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆46Apr 26, 2021Updated 4 years ago
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60May 16, 2019Updated 6 years ago
- Get or remove RunMRU values☆61Dec 11, 2019Updated 6 years ago
- ☆12Oct 5, 2020Updated 5 years ago
- The program can be used to scrape the content from an article from web by an input of a set of URLs in a text file or a URL. This project…☆17Aug 5, 2020Updated 5 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Mar 17, 2020Updated 5 years ago
- Java-Swing based ATM is a mini project application coded in Java programming language built using Netbeans. The application can be used f…☆20Sep 20, 2022Updated 3 years ago
- MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeo…☆11Jun 14, 2023Updated 2 years ago
- ☆10Jan 24, 2022Updated 4 years ago
- Dumping credentials through windbg and pykd☆41Sep 25, 2023Updated 2 years ago