doxx / blindLinks
TCP over DNS tunnel b[l]ind written in go.
☆12Updated 8 months ago
Alternatives and similar repositories for blind
Users that are interested in blind are comparing it to the libraries listed below
Sorting:
- ShoDam is a simple and effective bookmarklet designed to extract IP addresses from Shodan search results with a single click.☆16Updated 9 months ago
- Mythic C2 Profile that allows agents to communicate over GitHub☆14Updated 7 months ago
- 𝐌𝐞𝐭𝐚 𝐒𝐜𝐚𝐧 is an OSINT tool for Facebook that uses the Facebook Pages Scraper API from the RAPIDAPI website, developed for use wit…☆12Updated 10 months ago
- Advanced VPN, Parallel Internet, and De-Location Platform☆82Updated 5 months ago
- What's the Red Team doing to my Linux Box? - BSides Vienna 2024☆17Updated 9 months ago
- Firebase Misconfiguration Detection Toolkit - To be presented at Blackhat EU Arsenal☆22Updated 2 weeks ago
- SubCortex is a fast and efficient tool for passive subdomain enumeration. It aggregates subdomain data from multiple APIs, helping penetr…☆16Updated last month
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Updated 5 months ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆39Updated 5 months ago
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Updated 8 months ago
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Updated 11 months ago
- aiohttp LFI (CVE-2024-23334)☆27Updated last year
- ☆14Updated 9 months ago
- Ansible Role for Ludus to provision or remove a device to/from a Tailnet.☆12Updated last month
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Updated 5 months ago
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆81Updated this week
- PackageSpy is a versatile command-line tool designed to simplify the process of searching for packages on two popular package managers☆22Updated last year
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆88Updated last month
- Python tool to generate crafted JWTs, exploiting the algorithm confusion vulnerability in JWT signature validation. Useful for security …☆25Updated 5 months ago
- NetScan CLI is a command-line tool for retrieving and analyzing IP address information. It provides detailed subnet and organization data…☆62Updated last year
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆31Updated last year
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆101Updated 4 months ago
- This project enables malware to resurrect and remain hidden even after termination, using a User-Mode Program and Kernel-Mode Driver as p…☆10Updated 7 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆27Updated last year
- A simple tool to interact with web shells and command injection vulnerabilities☆35Updated 9 months ago
- Dump Linux keyrings☆20Updated last year
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆13Updated 10 months ago
- dump Chrome cookies remotely with atexec and CDP☆67Updated last year
- This tool generates an undetectable Windows reverse shell PowerShell script. Users can configure IP and Port according to their requireme…☆16Updated last year
- OnionHost allows you to host dark web sites using Termux or Linux, keeping everything on your local server for secure, self-hosted privac…☆12Updated 6 months ago