Spoofpoint is a domain monitoring tool that allows you to generate a list of domains that are 1 character off of your domain (grahamhelton.com turns into -> grahamheIton.com ((The L is a capital I )), check a list of domains you already have, or check as single domain.
☆45Mar 27, 2024Updated last year
Alternatives and similar repositories for spoofpoint
Users that are interested in spoofpoint are comparing it to the libraries listed below
Sorting:
- ☆10Apr 5, 2019Updated 6 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- Ansible playbooks that will without any user interaction provision Check Point Security Management server (SM) or Multi-Domain Management…☆11Jan 28, 2022Updated 4 years ago
- The Admin Assistant allows Splunk admins to monitor data ingestion and onboarding, RBAC config, user onboarding, and more! Dashboard pane…☆10Feb 27, 2022Updated 4 years ago
- ddos-checker is a tool used to perform a test on a website from a DDOS attack to find security gaps in a website.☆11Oct 16, 2025Updated 4 months ago
- Files for my Python3 Create Your Own Tool Series☆25Jul 21, 2022Updated 3 years ago
- AWS LocalStack + Spark Cluster + Zeppelin [Docker]☆10Jul 6, 2022Updated 3 years ago
- Demos of Donut used in conferences, etc. Mostly for my use, but free for others to use as a reference.☆32Nov 6, 2019Updated 6 years ago
- WebSecurityVision is a tool for checking XSS vulnerabilities and security headers in web applications, displaying browser information if …☆11Apr 6, 2023Updated 2 years ago
- A web-based serverless application which works on a decentralized system for handling transactions between users ruling out the utilizati…☆13May 6, 2022Updated 3 years ago
- G-Surge☆11Feb 7, 2018Updated 8 years ago
- Cradlepoint ECM Command Line Interface☆11Mar 7, 2023Updated 3 years ago
- CanIBeSpoofed is a console project utilising functionality built for the https://caniphish.com/free-phishing-tools/email-spoofing-test we…☆46Jan 26, 2025Updated last year
- cenarius tool for crack Wi-Fi , crack wpa-psk , crack wpa2-psk , crack wep , crack wps pin and crack hidden AP . cenarius psk crack☆32May 9, 2016Updated 9 years ago
- Telegram scraper for Maltego, allows from an Alias entity to find all forwarded accounts☆11Apr 25, 2023Updated 2 years ago
- BSentry is a comprehensive collection of additional security checks designed to enhance your Burp Suite experience.☆12Aug 16, 2024Updated last year
- ☆37May 8, 2022Updated 3 years ago
- A python script that downloads your whole suno library with your Token and URL entered.☆37Oct 30, 2025Updated 4 months ago
- Sample code of the OpenPGP Card☆12Apr 4, 2020Updated 5 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- Python decoder for ACARS messages, roughly inspired by wireshark☆14Mar 26, 2019Updated 6 years ago
- Docker Compose home server featuring Jellyfin, Jellyseer, Sonarr, Radarr, Prowlarr, Bazarr, qBittorrent, Pihole, Unbound, Traefik, Grafan…☆14Feb 24, 2026Updated last week
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Jun 12, 2019Updated 6 years ago
- A small WinRM client designed for interacting with JEA endpoints.☆13Aug 29, 2024Updated last year
- Creates statically linked python 3/2 with cross compilation☆11Jan 18, 2025Updated last year
- How to use math formulas in GitHub Markdown documents☆11May 10, 2018Updated 7 years ago
- Baseline, check and correct your SQL Database Security☆12Mar 9, 2022Updated 3 years ago
- A tool for generating reverse shell payloads on the fly.☆10Jun 18, 2022Updated 3 years ago
- Http Security Headers Checker Tool written in PHP Cli + Useful Tips to set Http Security Headers☆10Mar 27, 2021Updated 4 years ago
- RACF Database Parser☆12Apr 4, 2024Updated last year
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 6 years ago
- Windows SSPI wrapper in prue python☆15Nov 29, 2023Updated 2 years ago
- Sample terraform repo with multiple resources and a workflow that uses tools to automate cost management, security checks, best practices…☆10Jun 24, 2021Updated 4 years ago
- Check Safety of SSH Public Keys☆12Oct 8, 2022Updated 3 years ago
- Execute Shellcode And Other Goodies From MMC☆14Jun 17, 2015Updated 10 years ago
- ☆14Apr 29, 2019Updated 6 years ago
- Android application for checking security level of DRM and HDCP☆11Jan 23, 2023Updated 3 years ago
- Splunk Searches and Dashboards for DNS Threat Hunting☆10Mar 5, 2018Updated 8 years ago
- As I work thought the book "Practical Binary Analysis" by Dennis Andriesse, https://practicalbinaryanalysis.com/ I try to make editions f…☆11Sep 28, 2021Updated 4 years ago