haveibeensquatted / twistrsView external linksLinks
A domain name permutation and enumeration library powered by Rust.
☆132Updated this week
Alternatives and similar repositories for twistrs
Users that are interested in twistrs are comparing it to the libraries listed below
Sorting:
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40May 7, 2023Updated 2 years ago
- Used to check Github actions logs for secrets - specifically tj-actions and reviewdog☆22Mar 18, 2025Updated 10 months ago
- Port listener / honeypot in Rust with protocol guessing and safe string display☆36Feb 4, 2026Updated last week
- A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network c…☆41Feb 7, 2026Updated last week
- OpenCTI Add-On for Splunk☆13Jan 13, 2026Updated last month
- Burp Suite extension for testing Passkey systems.☆75Apr 1, 2025Updated 10 months ago
- urlscan.io API wrapper for Ruby☆13Oct 16, 2023Updated 2 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆43Apr 27, 2020Updated 5 years ago
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆33Updated this week
- Generate droppers with encrypted payloads automatically.☆54Nov 16, 2021Updated 4 years ago
- Off-The-Record Messaging protocol implementation for Python☆14Mar 19, 2025Updated 10 months ago
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆16Aug 29, 2025Updated 5 months ago
- Apfell C2 Server for the Google Chrome Extension Payload☆12Aug 12, 2020Updated 5 years ago
- Burp Suite extension to perform Kerberos authentication☆12Jan 19, 2026Updated 3 weeks ago
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- ☆12Mar 27, 2024Updated last year
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 4 months ago
- Scan and categorize websites for rapid triage☆12Jun 23, 2022Updated 3 years ago
- DNS server for pentesters☆50Nov 2, 2025Updated 3 months ago
- Piper Burp Suite Extender plugin☆16Jan 15, 2026Updated last month
- A command line alias manager and note taking tool☆13Oct 27, 2022Updated 3 years ago
- ☆11Feb 14, 2025Updated last year
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- Puzzle game: connect all terminals to the server☆20Jan 18, 2021Updated 5 years ago
- ☆15Aug 31, 2023Updated 2 years ago
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago
- ☆20Jul 9, 2019Updated 6 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Aug 1, 2020Updated 5 years ago
- Linkedin Tools (and maybe later other source) to reconstruct a company hierarchy from scraping relations and jobs title☆16Aug 4, 2020Updated 5 years ago
- Multicore EVTX to Elasticsearch ingestor for incident responders.☆14May 12, 2021Updated 4 years ago
- Do select-group-by on csv and other text files☆14Apr 23, 2022Updated 3 years ago
- High performance WordPress login bruteforcer with automatic concurrency for maximum amount of tries per second.☆78Feb 23, 2020Updated 5 years ago
- ☆83Aug 26, 2024Updated last year
- Signatures for wraith used to detect secrets across various sources☆15Jul 8, 2022Updated 3 years ago
- ☆13Aug 13, 2019Updated 6 years ago
- JXA script for Mythic that prints the TCC.db☆15Apr 18, 2021Updated 4 years ago
- Information Stealers Wall of Sheep (IS-WOS)☆11Nov 13, 2020Updated 5 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆13Mar 2, 2021Updated 4 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago