Dumain Bruteforcer - a fast and flexible domain bruteforcer
☆52Sep 19, 2018Updated 7 years ago
Alternatives and similar repositories for Dumb
Users that are interested in Dumb are comparing it to the libraries listed below
Sorting:
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- An information gathering tool to collect git commit emails in version control host services☆152May 5, 2019Updated 6 years ago
- Listing subdomains about a main domain☆59May 9, 2018Updated 7 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- WhiteBox CMS analysis☆69May 22, 2023Updated 2 years ago
- Protect your parents from phishing☆40Dec 4, 2017Updated 8 years ago
- Centralized Firewall Control☆21Feb 5, 2018Updated 8 years ago
- ☆63Mar 21, 2018Updated 7 years ago
- Kerberos / Windows AD / Linux PAM password change check against breached lists (HIBP), and other rules☆161Feb 2, 2023Updated 3 years ago
- Nix Audit made easier (RHEL, CentOS)☆65Apr 22, 2025Updated 10 months ago
- Check if a IP is from tor or is a malicious proxy☆57Feb 9, 2021Updated 5 years ago
- Advanced Netstat Using Python For Windows☆46Aug 21, 2017Updated 8 years ago
- Use your Shodan API Key to dump all the contents of exposed memcached servers.☆142Mar 12, 2018Updated 7 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Dec 5, 2020Updated 5 years ago
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- Tool to identify if a domain is a CMS such as Wordpress, Moodle, Joomla, Drupal or Prestashop☆111Oct 2, 2018Updated 7 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- Visual Basic GUI: A Tool to Inject Keystrokes on a SSH Client via an X11 Forwarded Session☆63Mar 13, 2018Updated 7 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆95Dec 23, 2020Updated 5 years ago
- Express security essentials deployment for Linux Servers☆60Oct 19, 2020Updated 5 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Oct 24, 2019Updated 6 years ago
- Lama, the application that does not mache these words.☆23Jun 9, 2019Updated 6 years ago
- WPHunter A Wordpress Vulnerability Scanner☆168Mar 23, 2018Updated 7 years ago
- Terminal Ip Lookup Tool☆56May 16, 2014Updated 11 years ago
- Inforfinder is a tool to collect information of any domains pointing at some server (ip, domain, range, file). Is able to detect all doma…☆68Sep 18, 2024Updated last year
- ☆66Feb 10, 2018Updated 8 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆42Oct 15, 2022Updated 3 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆96Mar 7, 2018Updated 7 years ago
- Analyse SQL injection attempts in web server logs☆82Jan 11, 2017Updated 9 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Jul 2, 2020Updated 5 years ago
- Scan for open S3 buckets and dump☆38Feb 23, 2018Updated 8 years ago
- A tool to help you manage your leaks☆34Nov 22, 2017Updated 8 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- Simple script to automate brutforcing blind sql injection vulnerabilities☆50Jul 16, 2017Updated 8 years ago
- This tool helps you pentest THE PAST of a website.☆15Jul 13, 2025Updated 7 months ago
- All challenges I created for CTF☆12Jun 7, 2021Updated 4 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- Malware detection using learning and information retrieval for Android☆74Aug 11, 2020Updated 5 years ago