dinosec / dnssecchefLinks
DNSSECChef: DNS/DNSSEC Interception Proxy
☆37Updated 6 years ago
Alternatives and similar repositories for dnssecchef
Users that are interested in dnssecchef are comparing it to the libraries listed below
Sorting:
- ☆21Updated 2 years ago
- Penetration Testing/Security Cheatsheets☆62Updated 10 years ago
- The "Virtual Whale" OSINT CTF at BSides DFW 2019!☆22Updated 6 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆16Updated 6 years ago
- Just a collection of pentest stuffs☆93Updated 5 years ago
- Automatically exported from code.google.com/p/nipper-ng☆72Updated 3 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 6 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆23Updated 4 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆127Updated 7 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Updated 6 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- A toolkit to attack Office365☆16Updated 6 years ago
- Python-based CLI Password Analyser (Reporting Tool)☆32Updated 4 years ago
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 170 other CMSs☆30Updated 6 years ago
- Script to automate, manage, and multithread Nikto scans.☆63Updated 5 years ago
- Let's obscure some IPv4 addresses☆37Updated 3 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- ☆33Updated 9 months ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆96Updated 4 years ago
- Import Nmap scans to Cherrytree☆37Updated 3 years ago
- Rogue Access Point Detector☆37Updated last year
- ☆15Updated 5 months ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated last year
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 3 years ago
- ☆30Updated 7 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆71Updated 2 years ago
- thethe☆116Updated 5 years ago
- OSINT tool to evaluate the trustworthiness of a company☆43Updated 5 years ago