faiyazahmad07 / monitor_subdomainsView external linksLinks
Monitor your target continuously for new subdomains!
☆25Mar 18, 2023Updated 2 years ago
Alternatives and similar repositories for monitor_subdomains
Users that are interested in monitor_subdomains are comparing it to the libraries listed below
Sorting:
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆25Nov 2, 2025Updated 3 months ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆39Sep 29, 2025Updated 4 months ago
- ☆18Mar 26, 2024Updated last year
- ☆17Jun 14, 2023Updated 2 years ago
- ☆19Sep 24, 2025Updated 4 months ago
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Dec 14, 2023Updated 2 years ago
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆41Oct 18, 2023Updated 2 years ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Dec 7, 2019Updated 6 years ago
- Proof of Concept Exploit for CVE-2024-9464☆45Oct 9, 2024Updated last year
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- 蜜罐检测工具,支持自动化URL去重、多线程控制及智能速率限制。可识别伪装服务。☆16Jun 5, 2025Updated 8 months ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 2 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- Google Dorking Payloads☆12Jun 24, 2024Updated last year
- ☆22Jan 12, 2024Updated 2 years ago
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Dec 15, 2023Updated 2 years ago
- M365 Defender SOC Playbooks☆24Feb 6, 2023Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Nov 8, 2022Updated 3 years ago
- quick and dirty proof-of-concept to hide shells in images☆51Jun 27, 2024Updated last year
- A Simple JS code to keylogger data and send it to the personal server☆31Dec 30, 2024Updated last year
- Github as C2 Demonstration , free API = free C2 Infrastructure☆145Aug 2, 2023Updated 2 years ago
- A Python command-line tool designed to collect TikTok data using SerpAPI for Google search results and Apify for TikTok data extraction.☆84Jan 26, 2026Updated 3 weeks ago
- CVE-2023-20273 Exploit PoC☆14Apr 1, 2024Updated last year
- Advanced test for proxy & waf☆13Feb 10, 2026Updated last week
- ☆15May 3, 2024Updated last year
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 2 years ago
- ☆28Sep 9, 2024Updated last year
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆57Dec 29, 2024Updated last year
- CoupDeWeb is an automated web vulnerability scanner designed for security researchers and developers. It scans for potential vulnerable …☆28Oct 17, 2024Updated last year
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30May 7, 2024Updated last year
- Repository for archiving Cobalt Strike configuration☆36Feb 5, 2026Updated last week
- Active C&C Detector☆155Oct 5, 2023Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Apr 22, 2023Updated 2 years ago
- ☆13Apr 25, 2024Updated last year
- ☆16Oct 18, 2024Updated last year
- ☆13Dec 21, 2023Updated 2 years ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated 11 months ago
- BlackHat Asia 2025 code and presentations☆18Apr 13, 2025Updated 10 months ago