grahamhelton / spoofpointView external linksLinks
Spoofpoint is a domain monitoring tool that allows you to generate a list of domains that are 1 character off of your domain (grahamhelton.com turns into -> grahamheIton.com ((The L is a capital I )), check a list of domains you already have, or check as single domain.
โ45Mar 27, 2024Updated last year
Alternatives and similar repositories for spoofpoint
Users that are interested in spoofpoint are comparing it to the libraries listed below
Sorting:
- โ10Apr 5, 2019Updated 6 years ago
- ๐ต๏ธโโ๏ธ HopMyTrack is an powerful OSINT tool to check for your information around the world wide web.โ24Feb 4, 2025Updated last year
- Ansible playbooks that will without any user interaction provision Check Point Security Management server (SM) or Multi-Domain Managementโฆโ11Jan 28, 2022Updated 4 years ago
- The Admin Assistant allows Splunk admins to monitor data ingestion and onboarding, RBAC config, user onboarding, and more! Dashboard paneโฆโ10Feb 27, 2022Updated 3 years ago
- ddos-checker is a tool used to perform a test on a website from a DDOS attack to find security gaps in a website.โ11Oct 16, 2025Updated 3 months ago
- Files for my Python3 Create Your Own Tool Seriesโ25Jul 21, 2022Updated 3 years ago
- A simple place to learn XSSโ31Mar 20, 2021Updated 4 years ago
- Demos of Donut used in conferences, etc. Mostly for my use, but free for others to use as a reference.โ32Nov 6, 2019Updated 6 years ago
- WebSecurityVision is a tool for checking XSS vulnerabilities and security headers in web applications, displaying browser information if โฆโ11Apr 6, 2023Updated 2 years ago
- G-Surgeโ11Feb 7, 2018Updated 8 years ago
- โ37Jun 27, 2020Updated 5 years ago
- BSentry is a comprehensive collection of additional security checks designed to enhance your Burp Suite experience.โ12Aug 16, 2024Updated last year
- โ37May 8, 2022Updated 3 years ago
- Telegram scraper for Maltego, allows from an Alias entity to find all forwarded accountsโ11Apr 25, 2023Updated 2 years ago
- Check the risk score of an IP Address ๐โ11May 16, 2024Updated last year
- Install, uninstall and control remote and local windows servicesโ13Feb 4, 2013Updated 13 years ago
- Docker Compose home server featuring Jellyfin, Jellyseer, Sonarr, Radarr, Prowlarr, Bazarr, qBittorrent, Pihole, Unbound, Traefik, Grafanโฆโ13Dec 16, 2024Updated last year
- A python script that downloads your whole suno library with your Token and URL entered.โ35Oct 30, 2025Updated 3 months ago
- โ14Apr 29, 2019Updated 6 years ago
- Configuration files for Unbound as a caching DNS server with DNSSEC validation and DNS over TLS forwarding.โ13Jan 13, 2019Updated 7 years ago
- Sample code with security policies in Pulumi CrossGuard to implement preventive security checks in Infrastructure pipelinesโ12Jan 4, 2023Updated 3 years ago
- RACF Database Parserโ11Apr 4, 2024Updated last year
- The Splunk Web Framework Toolkitโ12May 3, 2022Updated 3 years ago
- vault-consul-swarm-clusterโ10Aug 18, 2018Updated 7 years ago
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamoโฆโ10Jun 12, 2019Updated 6 years ago
- Python decoder for ACARS messages, roughly inspired by wiresharkโ14Mar 26, 2019Updated 6 years ago
- A collection of simple Bash scriptsโ10Nov 3, 2018Updated 7 years ago
- Check whether a Government of Canada domain is adhering to best security practices.โ12Feb 2, 2022Updated 4 years ago
- As I work thought the book "Practical Binary Analysis" by Dennis Andriesse, https://practicalbinaryanalysis.com/ I try to make editions fโฆโ11Sep 28, 2021Updated 4 years ago
- Terraform Azure Verified Resource Module for Network Security Groupโ17Jan 15, 2026Updated 3 weeks ago
- A collection of Splunk dashboard templates.โ15Apr 18, 2019Updated 6 years ago
- A Python based Recon Tool to search for Storage Bucketsโ11Jan 21, 2023Updated 3 years ago
- IronWASP module to test security of SSL services. Ported from http://www.bolet.org/TestSSLServer/โ12Sep 2, 2013Updated 12 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.โ11Oct 29, 2018Updated 7 years ago
- Baseline, check and correct your SQL Database Securityโ12Mar 9, 2022Updated 3 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.โ11Mar 15, 2021Updated 4 years ago
- Configurations to implement Wazuhโ12Nov 28, 2022Updated 3 years ago
- Checking for leaked passwords through haveibeenpwned v2 API using the hash-range checkerโ12Feb 7, 2024Updated 2 years ago
- github action to run the bandit security linterโ15Jan 20, 2026Updated 3 weeks ago