evilsocket / dittoLinks
A tool for IDN homograph attacks and detection.
☆738Updated 4 years ago
Alternatives and similar repositories for ditto
Users that are interested in ditto are comparing it to the libraries listed below
Sorting:
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆801Updated last year
- ☆371Updated 3 years ago
- DNSTake — A fast tool to check missing hosted DNS zones that can lead to subdomain takeover☆849Updated 2 years ago
- ChopChop is a CLI to help developers scanning endpoints and identifying exposition of sensitive services/files/folders.☆691Updated last year
- Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.☆829Updated 4 years ago
- A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.☆400Updated 7 months ago
- IP lookup by favicon using Shodan☆1,176Updated 6 months ago
- gather gather gather☆582Updated 4 months ago
- Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.☆257Updated 3 years ago
- A tool to make socks connections through HTTP agents☆711Updated 4 years ago
- Fast HTTP enumerator☆484Updated 3 months ago
- Log4Shell scanner for Burp Suite☆486Updated last year
- Hide your payload in DNS☆613Updated 2 years ago
- Mass scan IPs for vulnerable services☆1,039Updated 3 years ago
- Scan only once by IP address and reduce scan times with Nmap for large amounts of data.☆389Updated this week
- Credentials gathering tool automating remote procdump and parse of lsass process.☆767Updated 5 years ago
- A distributed nmap / masscan scanning framework complete with scan scheduling, engine pooling, subsequent scan port diff-ing, and an API …☆755Updated 2 years ago
- Fast directory scanning and scraping tool☆628Updated 4 months ago
- HTTP Request Smuggling over HTTP/2 Cleartext (h2c)☆743Updated 3 years ago
- Subdomain finder☆368Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,459Updated 2 years ago
- ☆561Updated 3 weeks ago
- JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP S…☆927Updated 3 years ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,784Updated 2 years ago
- ☆694Updated 8 months ago
- RCE 0-day for GhostScript 9.50 - Payload generator☆547Updated 3 years ago
- Attack Surface Management since before Attack Surface Management was a thing☆650Updated this week
- PoC exploits for software vulnerabilities☆680Updated 3 years ago
- MassDNS wrapper written in go to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard filtering…☆1,460Updated this week
- HoneyPoC: Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Se…☆279Updated 4 years ago