devanshbatham / ip2asn
A utility to quickly map IP addresses to their respective ASN
☆15Updated last year
Alternatives and similar repositories for ip2asn:
Users that are interested in ip2asn are comparing it to the libraries listed below
- A utility to fetch and display dns names from the SSL/TLS cert data☆13Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆25Updated last year
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆17Updated 2 months ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Updated 7 months ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 10 months ago
- TCP Data Transfer Tool By ClumsyLulz☆12Updated last year
- Multithreaded spraying of a password on all accounts of a domain.☆18Updated last week
- ☆21Updated last year
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 2 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Updated 9 months ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 8 years ago
- ☆14Updated 3 years ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆32Updated 2 weeks ago
- A Python script to find tenant id an region from a list of domain names.☆12Updated 3 weeks ago
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol☆31Updated 3 years ago
- Machine Learning basics with phishing dataset☆10Updated 3 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆25Updated 7 months ago
- ☆42Updated 2 years ago
- Poc script for ProxyShell exploit chain in Exchange Server☆18Updated 2 years ago
- ☆12Updated 4 years ago
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Updated this week
- Magento Security Scanner☆15Updated 3 years ago
- A malicious .cab creation tool for CVE-2021-40444☆12Updated 3 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Automated compromise detection of the world's most popular packages☆15Updated last year
- Cisco CallManager User Enumeration☆15Updated 2 years ago