Tail Certificate Transparency logs and extract hostnames
☆128Jun 21, 2025Updated 8 months ago
Alternatives and similar repositories for ctail
Users that are interested in ctail are comparing it to the libraries listed below
Sorting:
- rxtls is a hyper-optimized, per-core Certificate Transparency (CT) log processor built for one purpose: to extract and process 100,000+ X…☆55Jan 5, 2026Updated last month
- DomainsProject.org HTTP worker☆25Dec 11, 2022Updated 3 years ago
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- CT Log Scanner☆517Dec 26, 2025Updated 2 months ago
- A persistent database + CLI for your BBOT scan data 🧡☆42Updated this week
- SCEP request tool for AD CS and Intune☆73Oct 24, 2025Updated 4 months ago
- LD_PRELOAD library to bypass TLS certificate verification for debugging and testing☆94Feb 10, 2026Updated 3 weeks ago
- ☆41Feb 20, 2025Updated last year
- IPSpinner works as a local proxy that redirects requests through external services.☆112Mar 19, 2025Updated 11 months ago
- ☆159May 5, 2025Updated 9 months ago
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆102Jul 9, 2025Updated 7 months ago
- ☆50Jun 4, 2025Updated 8 months ago
- rust port of pspy with support for process monitoring over dbus☆36Jan 4, 2026Updated last month
- Recon tool to query cloud prefixes for services associated with an IP address☆23Oct 2, 2024Updated last year
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆358Jan 8, 2026Updated last month
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆25Feb 8, 2022Updated 4 years ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆34Jan 27, 2026Updated last month
- BOF to decrypt Signal Desktop chat logs☆71Feb 20, 2025Updated last year
- Various DNS dumps (daily new domains, FQDNs, etc.)☆24Updated this week
- Signature based honeypot detector tool written in Golang☆108Mar 22, 2025Updated 11 months ago
- A not-curated list of cloud hacking labs☆26Apr 18, 2024Updated last year
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- ASN Lookup Generator for Splunk☆10Jan 24, 2024Updated 2 years ago
- Enable EFS service as low priv user (PE & BOF)☆21Jul 6, 2025Updated 7 months ago
- 🔗 Simplify and Supercharge Your Links!☆17Updated this week
- ☆14Jun 27, 2024Updated last year
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- ☆11Oct 15, 2024Updated last year
- Lightweight program that pollinates STHs between Certificate Transparency logs and auditors☆26Aug 7, 2025Updated 6 months ago
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆190Feb 16, 2026Updated 2 weeks ago
- SOAPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆164Jan 23, 2026Updated last month
- ☆163Nov 19, 2025Updated 3 months ago
- Certipy in Docker☆13Mar 28, 2024Updated last year
- vulnerable windows binaries for exploitation practice☆48Jun 6, 2022Updated 3 years ago
- Security and Privacy Failures in Popular 2FA Apps☆20Oct 5, 2023Updated 2 years ago
- A stateful strace-like - Linux syscall tampering-first strace-like tool.☆17May 12, 2025Updated 9 months ago
- ☆18Updated this week