e-XpertSolutions / punycode-attack
β10Updated 7 years ago
Related projects β
Alternatives and complementary repositories for punycode-attack
- π Go-Observe: A command line Mozilla Observatory client written in Goβ12Updated 7 years ago
- Custom slash command to do ipinfo.io lookups from within Slackβ10Updated 8 years ago
- An active domain name query tool to help keep track of domain name movements...β15Updated 3 years ago
- Yet another no-frills low-interaction ssh honeypot in Go.β14Updated 4 years ago
- Search bing with pythonβ11Updated 10 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.β31Updated last month
- Python script to check the hashes of files in a directory against virustotal.comβ16Updated 9 years ago
- A reverse socks5 proxy server and clientβ18Updated 7 years ago
- Advanced HTTP fingerprinting PoCβ44Updated 7 years ago
- Artefacts from various retefe campaignsβ10Updated 5 years ago
- Mass scanning the internet (http and https) using a raw tcpstack.β59Updated 7 years ago
- Homographs: brutefind homographs within a fontβ18Updated 7 years ago
- Low-interaction VNC honeypot with a static challenge.β23Updated 5 years ago
- Identify web application versionsβ18Updated 7 years ago
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCPβ13Updated 7 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposesβ22Updated 9 years ago
- π‘ Monitor, analyze, & report security misconfigurations across environments.β18Updated 7 years ago
- Custom slash command to find all a domains A records from within Slackβ11Updated 8 years ago
- Custom slash command to do a basic dnsrecon from within Slackβ13Updated 8 years ago
- π A concurrent, command-line AWS S3 Fuzzer. Written in Go.β44Updated 7 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identifiedβ14Updated 5 years ago
- ARP ping detector on local networkβ15Updated 11 years ago
- Given a string determine the possible hashing algorithms used to produce that string.β18Updated 3 years ago
- proxyd proxies data between TCP, TLS, and unix socketsβ17Updated 7 years ago
- A collection of scripts made duing my personal researchβ28Updated 6 years ago
- post-exploitation toolsβ15Updated 6 years ago
- Simple SSH server that serves anonymous git repositories (read-only)β11Updated 6 years ago
- Phishing Toolkitβ19Updated 6 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.β13Updated 11 months ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filterβ¦β37Updated 10 years ago