elceef / dnstwistLinks
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
☆5,231Updated 2 months ago
Alternatives and similar repositories for dnstwist
Users that are interested in dnstwist are comparing it to the libraries listed below
Sorting:
- DNS Enumeration Script☆2,800Updated last week
- Attack Surface Management Platform☆8,834Updated 3 weeks ago
- A Tool for Domain Flyovers☆5,787Updated 3 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,339Updated 8 months ago
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,745Updated 2 weeks ago
- Fast subdomains enumeration tool for penetration testers☆10,429Updated 10 months ago
- Open Source Vulnerability Management Platform☆5,500Updated 3 weeks ago
- Advanced vulnerability scanning with Nmap NSE☆3,631Updated 9 months ago
- Loki - Simple IOC and YARA Scanner☆3,569Updated 7 months ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆7,683Updated this week
- E-mails, subdomains and names Harvester - OSINT☆12,875Updated this week
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,128Updated 5 years ago
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,673Updated this week
- Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.☆4,761Updated 7 months ago
- A DNS meta-query spider that enumerates DNS records, and subdomains.☆3,441Updated 3 years ago
- NSE script based on Vulners.com API☆3,314Updated last month
- A DNS reconnaissance tool for locating non-contiguous IP space.☆1,697Updated 10 months ago
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆14,695Updated 6 months ago
- Automated All-in-One OS Command Injection Exploitation Tool.☆5,318Updated this week
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,222Updated 4 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,884Updated last month
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,743Updated last month
- A list of public penetration test reports published by several consulting firms and academic security groups.☆8,963Updated last year
- Git All the Payloads! A collection of web attack payloads.☆3,798Updated 2 years ago
- Malicious traffic detection system☆7,045Updated this week
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,261Updated 9 months ago
- A swiss army knife for pentesting networks☆8,794Updated last year
- Web application fuzzer☆6,204Updated 10 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,693Updated 5 years ago
- File upload vulnerability scanner and exploitation tool.☆3,218Updated last month