doxx / blindLinks
TCP over DNS tunnel b[l]ind written in go.
☆12Updated 7 months ago
Alternatives and similar repositories for blind
Users that are interested in blind are comparing it to the libraries listed below
Sorting:
- ShoDam is a simple and effective bookmarklet designed to extract IP addresses from Shodan search results with a single click.☆16Updated 8 months ago
- Mythic C2 Profile that allows agents to communicate over GitHub☆14Updated 6 months ago
- Firebase Misconfiguration Detection Toolkit - To be presented at Blackhat EU Arsenal☆15Updated last week
- Advanced VPN, Parallel Internet, and De-Location Platform☆37Updated 4 months ago
- Ansible Role for Ludus to provision or remove a device to/from a Tailnet.☆10Updated 3 weeks ago
- What's the Red Team doing to my Linux Box? - BSides Vienna 2024☆17Updated 8 months ago
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Updated 10 months ago
- 𝐌𝐞𝐭𝐚 𝐒𝐜𝐚𝐧 is an OSINT tool for Facebook that uses the Facebook Pages Scraper API from the RAPIDAPI website, developed for use wit…☆11Updated 9 months ago
- ☆14Updated 8 months ago
- Unauthenticated RCE on CraftCMS when PHP `register_argc_argv` config setting is enabled☆46Updated 7 months ago
- NetScan CLI is a command-line tool for retrieving and analyzing IP address information. It provides detailed subnet and organization data…☆61Updated 11 months ago
- Authentication Bypass Vulnerability — CVE-2024–4358 — Telerik Report Server 2024☆12Updated 8 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆85Updated 5 months ago
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Updated 7 months ago
- Subdomain Scanner - the most exhaustive tool for sub-domain recognition and mapping to related IPs and ASNs☆17Updated last month
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆13Updated 9 months ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Updated 5 months ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆40Updated 3 months ago
- OnionHost allows you to host dark web sites using Termux or Linux, keeping everything on your local server for secure, self-hosted privac…☆12Updated 5 months ago
- aiohttp LFI (CVE-2024-23334)☆27Updated last year
- A no-reboot, in-memory Linux persistence PoC leveraging namespace joining, user-namespace elevation, and self‑deletion.☆46Updated this week
- Python tool to generate crafted JWTs, exploiting the algorithm confusion vulnerability in JWT signature validation. Useful for security …☆24Updated 4 months ago
- Dump Linux keyrings☆20Updated last year
- A package that get baseball data☆11Updated 5 months ago
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)☆40Updated 5 months ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Updated last year
- CVE-2025-5777 Citrix NetScaler Memory Leak Exploit (CitrixBleed 2)☆23Updated last month
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆39Updated 4 months ago
- In-Memory Rootkit For Linux and BSD☆73Updated this week
- This project enables malware to resurrect and remain hidden even after termination, using a User-Mode Program and Kernel-Mode Driver as p…☆10Updated 7 months ago