edoardogerosa / delatorView external linksLinks
Golang-based subdomain miner leveraging certificate transparency logs
β74Aug 8, 2023Updated 2 years ago
Alternatives and similar repositories for delator
Users that are interested in delator are comparing it to the libraries listed below
Sorting:
- π π₯οΈ Golang rewrite of eyes.sh. Let's you perform domain/IP address information gathering. Wasn't it esr who said "With enough eyeballsβ¦β50Aug 31, 2020Updated 5 years ago
- Kernel assisted microcontainer packerβ24Feb 15, 2019Updated 6 years ago
- Tool to find stored robots.txt files from the pastβ19Jun 4, 2023Updated 2 years ago
- a small utility to generate a cookie in order to exploit a grafana vulnerability (CVE-2018-15727)β22Aug 31, 2018Updated 7 years ago
- yet another dirbusterβ18Jan 14, 2021Updated 5 years ago
- Security Advisoriesβ11Sep 22, 2019Updated 6 years ago
- β‘οΈ Extensions, integrations, and wrappers for Uber's Zap logging libraryβ13May 9, 2020Updated 5 years ago
- Looks up details on a public IPV4 address against ip-info and blacklist-search sites. Providing a reputation check.β11Oct 16, 2021Updated 4 years ago
- A LinkedIn Scraperβ15Aug 20, 2018Updated 7 years ago
- A portable OSINT Swiss Army Knife for DFIR/OSINT professionals π΅οΈ π΅οΈ π΅οΈβ285Oct 18, 2023Updated 2 years ago
- gURL, it's like cURL but for SPDY in Go.β95Aug 11, 2012Updated 13 years ago
- Open Redirect Vulnerability Payload Listβ10Feb 23, 2021Updated 4 years ago
- A SSH honeypot written in Goβ13Dec 12, 2013Updated 12 years ago
- Go tool for building, distributing and publishing Go projectsβ28Updated this week
- β11Aug 2, 2017Updated 8 years ago
- An extensible, heuristic-based vulnerability scanning tool for installed npm packagesβ50Aug 10, 2021Updated 4 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissionsβ14Nov 13, 2022Updated 3 years ago
- Execute tasks across SSH hosts using random selectionβ17May 6, 2020Updated 5 years ago
- ASN target organization IP range attack surface mapping for reconnaissance, fast and lightweightβ220Apr 10, 2022Updated 3 years ago
- βοΈ Research project for SubFinder core API V2β34Dec 30, 2018Updated 7 years ago
- Light Armoured Recon is a python script designed to automate passive recon. It automates execution of TheHarvester, whois, Robtex.com, Buβ¦β40Feb 28, 2018Updated 7 years ago
- Interactive Post Exploitation Toolβ37Oct 1, 2019Updated 6 years ago
- Catch IMAP/POP passwords and see incoming and outgoing messagesβ16Sep 15, 2013Updated 12 years ago
- A curated collection of some cool Penetration scripts.β14Feb 25, 2021Updated 4 years ago
- This tool was created as a Proof of Concept to reveal the threats related to web service misconfiguration using CloudFlare as reverse prβ¦β14Feb 20, 2023Updated 2 years ago
- Scripts to make life easierβ12Jun 16, 2020Updated 5 years ago
- RTSPServer Code Execution Vulnerability CVE-2018-4013β15Nov 26, 2018Updated 7 years ago
- Apply a filter to the events being reported by windows event loggingβ15Sep 10, 2020Updated 5 years ago
- String or worldlist encoder for use in fuzzing or web application testingβ19Sep 2, 2019Updated 6 years ago
- Framework for exploiting local vulnerabilitiesβ84Nov 18, 2023Updated 2 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory Userβ66Sep 9, 2021Updated 4 years ago
- Scan secrets from Continuous Integration Build Logsβ53Oct 14, 2019Updated 6 years ago
- Open source all-in-one CLI tool to semi-automate pentesting.β165May 21, 2020Updated 5 years ago
- Auto Recon Bash Scriptβ31Dec 31, 2024Updated last year
- Reconnaissance test in Kubernetes clustersβ21Oct 19, 2018Updated 7 years ago
- GitOps deployment example to Kubernetes from GitHub.β15Oct 22, 2019Updated 6 years ago
- OpenSSH 7.7 - Username Enumerationβ17Oct 23, 2020Updated 5 years ago
- Miscellaneous scripts, braindumps, snippets.β15Jan 7, 2024Updated 2 years ago
- List of XSS Payloadsβ15Jul 5, 2022Updated 3 years ago