felmoltor / DNSBruteForcer
Zone transfer a domain from its own NS servers and bruteforce subdomains
☆12Updated 2 months ago
Alternatives and similar repositories for DNSBruteForcer
Users that are interested in DNSBruteForcer are comparing it to the libraries listed below
Sorting:
- Zone transfers for rwhois☆20Updated 6 years ago
- Scan for open S3 buckets and dump☆37Updated 7 years ago
- Burp extension to decode NTLM SSP headers and extract domain/host information☆31Updated 4 years ago
- Better Exploit Code For CVE 2017 9805 apache struts☆20Updated 7 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆21Updated 8 years ago
- ☆25Updated 8 years ago
- Python tool for expired domain discovery in crossdomain.xml files☆23Updated 8 years ago
- XLSX parser for nessus and nmap scan results.☆13Updated 5 years ago
- ☆47Updated 9 years ago
- An easy to grep dump of the NVD database showing only; CVE-ID, CVSS Risk Score, and Summary.☆55Updated 3 years ago
- Miscellaneous for various things☆20Updated 5 months ago
- Generates several metasploit payloads☆15Updated 7 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 8 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆24Updated 5 months ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Updated 10 years ago
- My python3 implementation of a Forward Shell☆35Updated 6 years ago
- Windows Privesc Check☆20Updated 10 years ago
- the Open Source Windows Privilege Escalation Guide☆10Updated 8 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36Updated 6 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆57Updated 8 months ago
- Search the ExploitDB with a little more control☆21Updated 7 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Updated 8 years ago
- ☆49Updated 10 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Updated 11 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- A BurpSuite extension for lair☆28Updated 7 years ago
- BurpSuite extension to assist with Automated Forced Browsing/Endpoint Enumeration☆23Updated 7 years ago
- Python script to detect bluekeep vulnerability (CVE-2019-0708) with TLS/SSL and x509 support☆27Updated 5 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆33Updated 5 years ago