e-XpertSolutions / punycode-attack
☆10Updated 8 years ago
Alternatives and similar repositories for punycode-attack:
Users that are interested in punycode-attack are comparing it to the libraries listed below
- VirusTotal public api interface implementation in Golang.☆13Updated 10 years ago
- Custom slash command to do ipinfo.io lookups from within Slack☆10Updated 8 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆21Updated 9 years ago
- 🌌 Go-Observe: A command line Mozilla Observatory client written in Go☆12Updated 8 years ago
- Homographs: brutefind homographs within a font☆18Updated 8 years ago
- Custom slash command to find all a domains A records from within Slack☆11Updated 8 years ago
- Artefacts from various retefe campaigns☆10Updated 6 years ago
- Virustotal API for Go☆65Updated 6 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆10Updated 9 years ago
- post-exploitation tools☆15Updated 7 years ago
- Custom slash command to do a basic dnsrecon from within Slack☆12Updated 8 years ago
- Collection of dockerfiles to build containers☆13Updated 7 years ago
- Honeypot for Intel's AMT Firmware Vulnerability CVE-2017-5689☆18Updated last year
- Collect autorun records from running system☆61Updated 3 years ago
- Low-interaction VNC honeypot with a static challenge.☆22Updated 5 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Updated 7 years ago
- Monitor Certificate Transparency Logs For Phishing Domains☆25Updated 6 years ago
- Lair Framework dockerized.☆38Updated 4 years ago
- Exploit framework written in Go☆28Updated 7 years ago
- Docker configs and build scripts.☆22Updated 10 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Mass scanning the internet (http and https) using a raw tcpstack.☆59Updated 8 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Updated 10 years ago
- Given a string determine the possible hashing algorithms used to produce that string.☆18Updated 4 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- 🛡 Monitor, analyze, & report security misconfigurations across environments.☆18Updated 7 years ago
- A Beat that monitors a local Nessus reports directory and outputs scan results to Elasticsearch or Logstash.☆31Updated 7 years ago
- Yet another no-frills low-interaction ssh honeypot in Go.☆14Updated 5 years ago