A tool to monitor for potential spear phishing domains and send to Slack.
☆23Feb 8, 2024Updated 2 years ago
Alternatives and similar repositories for dnstwist
Users that are interested in dnstwist are comparing it to the libraries listed below
Sorting:
- A simple threaded Python script that returns the authentication methods supported by each of a list of SSH servers..☆12Jul 29, 2015Updated 10 years ago
- Run PowerShell command without invoking powershell.exe☆12Sep 2, 2017Updated 8 years ago
- ☆11Oct 21, 2020Updated 5 years ago
- Oxomium is a cybersecurity gouvernance and conformity (GRC) tool for CISCO and SECOPS. By linking framework requirements, controld schedu…☆17Mar 9, 2026Updated last week
- ☆53May 18, 2024Updated last year
- Deliberately vulnerable AWS resources for security assessment demos☆32Aug 20, 2022Updated 3 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆44Sep 12, 2024Updated last year
- Banned word lists for use with Lithnet Password Protection for Active Directory☆12Jul 10, 2023Updated 2 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- Linux Containers via Chef☆59Apr 5, 2022Updated 3 years ago
- A work-in-progress GameBoy emulator.☆11Dec 21, 2021Updated 4 years ago
- Deep and Dark Web OSINT Tool☆10Sep 18, 2018Updated 7 years ago
- This is a simple Powershell script that can be used to install a windows .MSI file(Software) without going through selecting and pressing…☆13Jul 5, 2019Updated 6 years ago
- ☆17Nov 3, 2017Updated 8 years ago
- All In One Tools Hacking☆27Jul 2, 2019Updated 6 years ago
- Examples of using Consul Connect features in Nomad☆10Updated this week
- ☆41Updated this week
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆62Jan 10, 2022Updated 4 years ago
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Feb 28, 2023Updated 3 years ago
- ☆14Mar 18, 2025Updated last year
- Scripts to help with using gam for Google Workspace administration☆16Mar 7, 2024Updated 2 years ago
- Parser to convert BURP Pro .XML to .CSV and build a Word .Docx Template☆14Dec 8, 2021Updated 4 years ago
- OSED course preparation materials.☆15May 27, 2021Updated 4 years ago
- Git repo to unify JWT/OIDC vault auth terraform projects☆13Feb 16, 2022Updated 4 years ago
- Handy scripts developed and discussed on http://auditcasts.com☆19Aug 19, 2019Updated 6 years ago
- An example Mesos framework in Java for development purposes.☆10Feb 28, 2016Updated 10 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- ☆11Feb 10, 2026Updated last month
- ☆22Jul 12, 2024Updated last year
- CVE-2020-36109 PoC causing DoS☆17Apr 20, 2022Updated 3 years ago
- TN3270 MitM proxy and so much more☆14Jun 4, 2018Updated 7 years ago
- Uses list of anything really (setup using forex pairs pulled from a pastebin), takes the pairs and works out twitter sentiment and polari…☆19Apr 25, 2017Updated 8 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Feb 1, 2022Updated 4 years ago
- Contains a JUnit RunListener for generating JUnit XML reports☆17May 1, 2022Updated 3 years ago
- ☆20Jan 25, 2019Updated 7 years ago
- AI assisted incident response for any cyber issue. Clear malware, patch networks, isolate machines, perform active defence with guided te…☆17Oct 17, 2023Updated 2 years ago
- Websocket based egress tester☆20Nov 23, 2016Updated 9 years ago
- Headless Hathor Wallet☆17Updated this week