grahamhelton / spoofpointView external linksLinks
Spoofpoint is a domain monitoring tool that allows you to generate a list of domains that are 1 character off of your domain (grahamhelton.com turns into -> grahamheIton.com ((The L is a capital I )), check a list of domains you already have, or check as single domain.
☆45Mar 27, 2024Updated last year
Alternatives and similar repositories for spoofpoint
Users that are interested in spoofpoint are comparing it to the libraries listed below
Sorting:
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- The Admin Assistant allows Splunk admins to monitor data ingestion and onboarding, RBAC config, user onboarding, and more! Dashboard pane…☆10Feb 27, 2022Updated 3 years ago
- ddos-checker is a tool used to perform a test on a website from a DDOS attack to find security gaps in a website.☆11Oct 16, 2025Updated 3 months ago
- G-Surge☆11Feb 7, 2018Updated 8 years ago
- WebSecurityVision is a tool for checking XSS vulnerabilities and security headers in web applications, displaying browser information if …☆11Apr 6, 2023Updated 2 years ago
- CanIBeSpoofed is a console project utilising functionality built for the https://caniphish.com/free-phishing-tools/email-spoofing-test we…☆46Jan 26, 2025Updated last year
- ☆37Jun 27, 2020Updated 5 years ago
- Docker Compose home server featuring Jellyfin, Jellyseer, Sonarr, Radarr, Prowlarr, Bazarr, qBittorrent, Pihole, Unbound, Traefik, Grafan…☆13Dec 16, 2024Updated last year
- ☆37May 8, 2022Updated 3 years ago
- BSentry is a comprehensive collection of additional security checks designed to enhance your Burp Suite experience.☆12Aug 16, 2024Updated last year
- Install, uninstall and control remote and local windows services☆13Feb 4, 2013Updated 13 years ago
- Check the risk score of an IP Address 🔎☆11May 16, 2024Updated last year
- This tool converts OVA (Open Virtual Appliance) or VMDK (Virtual Machine Disk) files to Docker container format.☆23Sep 23, 2025Updated 4 months ago
- ☆28Sep 5, 2025Updated 5 months ago
- How to use math formulas in GitHub Markdown documents☆11May 10, 2018Updated 7 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 4 years ago
- an awesome list of honeypot resources☆10Jul 14, 2017Updated 8 years ago
- vault-consul-swarm-cluster☆10Aug 18, 2018Updated 7 years ago
- A small WinRM client designed for interacting with JEA endpoints.☆13Aug 29, 2024Updated last year
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Splunk Searches and Dashboards for DNS Threat Hunting☆10Mar 5, 2018Updated 7 years ago
- Sample terraform repo with multiple resources and a workflow that uses tools to automate cost management, security checks, best practices…☆10Jun 24, 2021Updated 4 years ago
- A libre software which is providing a backend architecture for collecting data from probes and storing proof of checks.☆11Jan 16, 2026Updated 3 weeks ago
- Python decoder for ACARS messages, roughly inspired by wireshark☆14Mar 26, 2019Updated 6 years ago
- A collection of Splunk dashboard templates.☆15Apr 18, 2019Updated 6 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- Check whether a Government of Canada domain is adhering to best security practices.☆12Feb 2, 2022Updated 4 years ago
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆18Mar 20, 2025Updated 10 months ago
- IronWASP module to test security of SSL services. Ported from http://www.bolet.org/TestSSLServer/☆12Sep 2, 2013Updated 12 years ago
- A Gradle plugin for checking whether an .apk or an .aar contains OpenSSL versions with known vulnerabilities☆12Nov 28, 2016Updated 9 years ago
- Android application for checking security level of DRM and HDCP☆10Jan 23, 2023Updated 3 years ago
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 5 years ago
- The Splunk Web Framework Toolkit☆12May 3, 2022Updated 3 years ago
- Looks up details on a public IPV4 address against ip-info and blacklist-search sites. Providing a reputation check.☆11Oct 16, 2021Updated 4 years ago
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Jun 12, 2019Updated 6 years ago
- Fuzzing Secure Monitor Implementations☆19Aug 3, 2024Updated last year
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- A BOF to parse the imports of a provided PE-file, optionally extracting symbols on a per-dll basis.☆86Oct 28, 2021Updated 4 years ago
- Exploit a vulnerable Spring application with the Spring4Shell (CVE-2022-22965) Vulnerability.☆44Apr 6, 2022Updated 3 years ago