german-namestnikov / unhidens
Small DNS Recon utility, allows you to obtain some useful info about NS-servers placed behind relays, firewalls, etc.
☆22Updated 7 years ago
Alternatives and similar repositories for unhidens:
Users that are interested in unhidens are comparing it to the libraries listed below
- Asynchronous HTTP pipelining directory buster☆22Updated 4 years ago
- Multithreaded HTTP scanner☆46Updated 4 years ago
- Git manager for pentesters☆107Updated 8 years ago
- Python addon for dirsearch☆15Updated 6 years ago
- Packaging audit toolkit using vulners.com vulnerability database☆19Updated 6 years ago
- Filet-O-Firewall Vulnerability PoC☆61Updated 9 years ago
- NSE-script for brute force open ports☆26Updated 9 years ago
- Pew pew☆9Updated 9 years ago
- SQL SERVER Exploitation.☆27Updated 7 years ago
- Safari local file reader☆122Updated 6 years ago
- Apache server-status link parser☆24Updated 5 years ago
- Web hacking assistance toolkit☆112Updated 7 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Updated 7 years ago
- Vulnerability scanner based on vulners.com audit API☆65Updated 6 years ago
- Advanced virtual host bruteforcer☆31Updated 9 years ago
- Fingerprints servers, finds exploits, scans WebDAV. May or may not also make coffee.☆121Updated 5 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆60Updated 4 years ago
- Repository for penetration testing tools☆37Updated 5 years ago
- Tools developed to test the Redirect to SMB issue☆83Updated 9 years ago
- unix wildcard attacks☆132Updated 6 years ago
- A modular distributed penetration testing tool.☆41Updated 8 years ago
- QCTF School 2018. Developed with ♥ by Hackerdom team☆12Updated 6 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Updated 7 years ago
- A list of checks with tips for analyzing the security of Android applications☆11Updated 5 years ago
- SQLMap Cheatsheet v1.0 for sqlmap 1.0-dev-a72d738☆76Updated 10 years ago
- Ivan Ricart Borges - Program to detect the existence of remote/local stack-based buffer-overflow vulnerabilities using the standard commu…☆54Updated 3 years ago
- Vulners signature-base software version detection rules☆37Updated 3 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆51Updated 4 years ago
- ☆24Updated 10 years ago
- нерегулярный подкаст о жизни ресечеров по обе стороны океана☆34Updated 6 years ago