german-namestnikov / unhidensLinks
Small DNS Recon utility, allows you to obtain some useful info about NS-servers placed behind relays, firewalls, etc.
☆22Updated 8 years ago
Alternatives and similar repositories for unhidens
Users that are interested in unhidens are comparing it to the libraries listed below
Sorting:
- Git manager for pentesters☆107Updated 9 years ago
- Vulnerability scanner based on vulners.com audit API☆199Updated 7 years ago
- SQLMap Cheatsheet v1.0 for sqlmap 1.0-dev-a72d738☆75Updated 11 years ago
- Packaging audit toolkit using vulners.com vulnerability database☆20Updated 7 years ago
- Asynchronous HTTP pipelining directory buster☆24Updated 5 years ago
- google hack database automation tool☆203Updated 8 years ago
- Script to identify hosts vulnerable to CVE-2018-10933☆232Updated 7 years ago
- A cheat sheet for pentesters and researchers about vulnerabilities in well-known monitoring systems.☆168Updated 4 years ago
- Advanced virtual host bruteforcer☆31Updated 10 years ago
- A small python script to check for Cross-Site Tracing (XST)☆133Updated 9 years ago
- Turn your Burp suite into headless active web application vulnerability scanner☆154Updated 7 years ago
- 🔥🔥🔥 Out of the Browser into the Fire - Cross platform XSS worm framework 🔥🔥🔥☆134Updated 9 years ago
- Filet-O-Firewall Vulnerability PoC☆61Updated 10 years ago
- Fingerprints servers, finds exploits, scans WebDAV. May or may not also make coffee.☆123Updated 6 years ago
- Multithreaded HTTP scanner☆46Updated 5 years ago
- XSSYA (Cross Site Scripting Scanner & Vulnerability Confirmation)☆97Updated 2 years ago
- CMS Detection and Exploit Kit based on Whatcms.org API☆257Updated last year
- MassBleed SSL Vulnerability Scanner☆245Updated 5 years ago
- Web hacking assistance toolkit☆113Updated 8 years ago
- ☆18Updated 7 years ago
- Safari local file reader☆122Updated 7 years ago
- A tool to generate media files with malicious metadata☆127Updated 6 years ago
- Search exploits in multiple exploit databases!☆85Updated 5 years ago
- NSE-script for brute force open ports☆27Updated 10 years ago
- SQL SERVER Exploitation.☆27Updated 8 years ago
- Summary and archives of leaked Russian TLD DNS data☆186Updated 8 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆167Updated 6 years ago
- Use your Shodan API Key to dump all the contents of exposed memcached servers.☆142Updated 7 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆191Updated 6 years ago
- ☆10Updated 9 years ago