esonderegger / dotmil-domainsView external linksLinks
An incomplete listing of `.mil` domains and the code for the scraper used to build the list
☆53Jul 9, 2015Updated 10 years ago
Alternatives and similar repositories for dotmil-domains
Users that are interested in dotmil-domains are comparing it to the libraries listed below
Sorting:
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- ☆13Feb 26, 2021Updated 4 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Dotmil subdomain discovery tool that scrapes domains from official DoD website directories and certificate transparency logs☆95Jan 21, 2021Updated 5 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 3 years ago
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- Exploit for Joomla JCK Editor 6.4.4 (CVE-2018-17254)☆10Apr 17, 2021Updated 4 years ago
- A collection of famous recon public scripts, but in bash <3☆29Mar 2, 2021Updated 4 years ago
- A complete agency API program.☆12Apr 27, 2017Updated 8 years ago
- Turn raw electronic FEC filings into meaningful data☆19May 20, 2016Updated 9 years ago
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago
- bSidesLisbon 2016 event contents☆10Dec 14, 2016Updated 9 years ago
- A Jekyll plugin to test frontmatter on posts and other documents in a Jekyll site.☆29Mar 24, 2017Updated 8 years ago
- ☆20Apr 8, 2023Updated 2 years ago
- extract tables from scanned pdf files☆13Jan 25, 2014Updated 12 years ago
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 2 years ago
- Plugins for the Viper Framework☆14Sep 21, 2019Updated 6 years ago
- Execute tasks across SSH hosts using random selection☆17May 6, 2020Updated 5 years ago
- Security test tool for Blind XSS☆26Mar 5, 2020Updated 5 years ago
- Yara rules for malicious javascript files from public repositories or written by me.☆13Nov 12, 2021Updated 4 years ago
- Objectify-s3 is a tool that recursively checks AWS S3 buckets and objects for misconfigured permissions.☆15Aug 3, 2024Updated last year
- ☆12Jan 4, 2022Updated 4 years ago
- ☆13Mar 15, 2022Updated 3 years ago
- Bash script to extract data from the Waybackmachine☆11Mar 15, 2021Updated 4 years ago
- ☆15Dec 22, 2021Updated 4 years ago
- [deprecated] see README☆42May 15, 2020Updated 5 years ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- Resolve data table conflicts☆17Jun 11, 2015Updated 10 years ago
- Advices to look for malicious software on your devices☆17May 6, 2020Updated 5 years ago
- ☆18Nov 18, 2022Updated 3 years ago
- HOLM (Hashes.Org Left Manager)☆12Feb 23, 2016Updated 9 years ago
- Package pwnedpass is a Go package for querying a local instance of Troy Hunt's Pwned Passwords database.☆15Nov 13, 2023Updated 2 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 10 years ago
- Burpsuite Plugin to detect Directory Traversal vulnerabilities☆27Jul 22, 2021Updated 4 years ago
- ☆28Sep 25, 2020Updated 5 years ago
- ☆12Jun 15, 2022Updated 3 years ago
- ☆18Oct 4, 2020Updated 5 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Apr 5, 2020Updated 5 years ago
- Following OWASP TOP 10 (the top ten most critical web application security risk) I decided to build an XSS Scanner.☆12Dec 12, 2022Updated 3 years ago