A tool to monitor for potential spear phishing domains and send to Slack.
☆23Feb 8, 2024Updated 2 years ago
Alternatives and similar repositories for dnstwist
Users that are interested in dnstwist are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated 2 years ago
- Run PowerShell command without invoking powershell.exe☆12Sep 2, 2017Updated 8 years ago
- ☆55May 18, 2024Updated last year
- ☆27Jan 5, 2023Updated 3 years ago
- Deliberately vulnerable AWS resources for security assessment demos☆32Aug 20, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Munki Theme Maker allows you to create custom color based scheme themes for Munki.☆11Jul 28, 2024Updated last year
- AEM Dispatcher Security Scan☆18Apr 23, 2026Updated last week
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- Banned word lists for use with Lithnet Password Protection for Active Directory☆12Jul 10, 2023Updated 2 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- Deep and Dark Web OSINT Tool☆12Sep 18, 2018Updated 7 years ago
- Detect and remove the presence of canary tokens☆26Dec 9, 2023Updated 2 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 9 years ago
- ☆17Nov 3, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- All In One Tools Hacking☆27Jul 2, 2019Updated 6 years ago
- 🎓Materials for the Hands-On Introduction to OpenFAIR Risk Analysis with Tidyrisk☆14Jan 22, 2021Updated 5 years ago
- ☆41Updated this week
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆62Jan 10, 2022Updated 4 years ago
- Get Network Extension Status☆50Apr 28, 2023Updated 3 years ago
- A Python script to extract the list of users of a GiTea instance, unauthenticated or authenticated.☆15Feb 11, 2025Updated last year
- Small python script to generate random time series data into log files☆22Jan 28, 2019Updated 7 years ago
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Feb 28, 2023Updated 3 years ago
- ☆14Apr 15, 2026Updated 2 weeks ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆54Oct 10, 2023Updated 2 years ago
- CVEFeed.io: The Ultimate Hub for Vulnerability Insights and Intelligence☆42Mar 3, 2024Updated 2 years ago
- Parser to convert BURP Pro .XML to .CSV and build a Word .Docx Template☆14Dec 8, 2021Updated 4 years ago
- OSED course preparation materials.☆16May 27, 2021Updated 4 years ago
- The Swiss army knife of evasion tool that bypasses AMSI, Applocker, and CLM mode simultaneously.☆27Mar 9, 2024Updated 2 years ago
- Handy scripts developed and discussed on http://auditcasts.com☆19Aug 19, 2019Updated 6 years ago
- A Nintendo Switch source port of Descent.☆13Sep 12, 2018Updated 7 years ago
- ☆11Feb 10, 2026Updated 2 months ago
- ☆22Jul 12, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- TN3270 MitM proxy and so much more☆14Jun 4, 2018Updated 7 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Feb 1, 2022Updated 4 years ago
- egg - the simple error eggregator☆14Feb 25, 2021Updated 5 years ago
- AI assisted incident response for any cyber issue. Clear malware, patch networks, isolate machines, perform active defence with guided te…☆17Oct 17, 2023Updated 2 years ago
- Headless Hathor Wallet☆17Mar 31, 2026Updated last month
- ☆17Mar 17, 2026Updated last month
- ☆18Jul 14, 2021Updated 4 years ago