A Python DNS crawler to find identical domain names under different TLDs.
☆25May 18, 2019Updated 6 years ago
Alternatives and similar repositories for domfind
Users that are interested in domfind are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- Exploits for different vulnerabilities☆12Nov 29, 2021Updated 4 years ago
- A modular Python application to pull intelligence about malicious files☆123Dec 4, 2020Updated 5 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆65Jan 11, 2023Updated 3 years ago
- Python IOC Editor☆66Mar 10, 2015Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Nov 23, 2025Updated 5 months ago
- Pythonic interface to the Internet Storm Center / DShield API.☆28May 23, 2023Updated 2 years ago
- Python tool for large scale git analysis. Inspired by gitrob.☆21Jun 12, 2020Updated 5 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- This is a Terminal Custom Color Pallet based off the colors used from Defcon27☆14Jul 23, 2020Updated 5 years ago
- A script to automatically list visually indistinguishable permutations of domain names using IDN and punycode.☆21May 29, 2017Updated 8 years ago
- A simple python library to assist in working with cpes☆19Jan 30, 2024Updated 2 years ago
- Tiny library to parse the subdomain, domain, and tld extension from a host string☆23Apr 1, 2022Updated 4 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- :e-mail: Enumerate usernames through SMTP service☆18Jun 30, 2019Updated 6 years ago
- Tools for the Computer Incident Response Team☆151Apr 17, 2017Updated 9 years ago
- A simple script to scrape a list of accounts or single account from Twitter into a neatly formatted Excel file.☆18Jan 25, 2023Updated 3 years ago
- ☆11Dec 17, 2024Updated last year
- A quick bash script that I created in order to speed up the creation of usable kali boxes.☆12Oct 29, 2021Updated 4 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆60Dec 10, 2014Updated 11 years ago
- A Python RESTful API framework for online malware analysis and threat intelligence services.☆367May 21, 2024Updated last year
- Malware Simulator - Pretend a malware infection by creating a text file into several locations on the local system and also in the networ…☆26Mar 6, 2018Updated 8 years ago
- ☆35Aug 30, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- This script is to build Wazuh 4.3 environment☆12May 30, 2022Updated 3 years ago
- A script to analyze geographic GSuite Login activity☆10Sep 3, 2017Updated 8 years ago
- A tool for simplifying the process of researching IOCs.☆25Sep 24, 2021Updated 4 years ago
- A Prometheus Exporter that collects all vulnerabilities detected by aquasecurity/trivy in kubernetes clusters☆11Sep 30, 2022Updated 3 years ago
- EmailSecCheck is a lightweight Python utility used to check for common SPF/DMARC misconfigurations that may allow for email spoofing.☆21May 9, 2025Updated last year
- ☆10Feb 13, 2025Updated last year
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆13Dec 2, 2024Updated last year
- Extract parameters/paths from urls☆17Aug 2, 2020Updated 5 years ago
- An interactive world-map that has been used in live Cyber Threat interfaces☆13Jul 31, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Automatic, fast parsing of browser artifacts☆17Jan 4, 2025Updated last year
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago
- Harbinger Threat Intelligence☆83Dec 8, 2015Updated 10 years ago
- Fetch all Honeypot☆12Oct 3, 2018Updated 7 years ago
- Yet Another Fake Honeypot written in Go☆10Dec 8, 2017Updated 8 years ago
- A collection of hardware Trojans (HTs) automatically generated by Large Language Models (GPT-4, Gemini-1.5-pro, and LLaMA3) targeting SRA…☆12Oct 8, 2025Updated 7 months ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Dec 1, 2023Updated 2 years ago