helviojunior / enumdnsLinks
EnumDNS is a modular DNS reconnaissance tool capable of resolving hosts from various sources, including wordlists, BloodHound files, and Active Directory environments.
☆16Updated this week
Alternatives and similar repositories for enumdns
Users that are interested in enumdns are comparing it to the libraries listed below
Sorting:
- SprayShark is a modular G-Suite password sprayer with threading!☆52Updated 5 months ago
- ☆19Updated 4 months ago
- An advanced JWT extraction & decoding tool for bug bounty hunters! 🏴☠️☆45Updated 7 months ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆92Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆122Updated last year
- MailSecOps is an email and mail gateway security testing tool. With this script, you can perform mail spoofing, relay tests and security …☆56Updated 11 months ago
- ☆35Updated 7 months ago
- ☆91Updated 2 years ago
- A real fake social engineering app☆127Updated 3 months ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆67Updated last year
- ☆65Updated last year
- Repo for all my exploits/PoCs☆53Updated 5 months ago
- An AI-driven vulnerability scanner that uses Nmap to discover open services on a user-supplied IP, matches each service to relevant CVEs …☆47Updated 5 months ago
- External recon toolkit☆53Updated 10 months ago
- A fast Go-based tool to uncover sensitive information in JavaScript☆34Updated 3 months ago
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, a…☆98Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆132Updated last year
- Simple chrome extension for full name extraction and conversion to emails/usernames. Utilizes the 'people' tab of the target company on L…☆25Updated 6 months ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated 2 years ago
- A small executable to trick a user to authenticate using code matching MFA☆69Updated 2 years ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- Automates the network enumeration process in a fire-and-forget manner, among many more functions. Zero effort, zero error network enumera…☆52Updated 3 weeks ago
- A command-line utility for performing reverse DNS lookups☆74Updated 2 years ago
- ☆109Updated 11 months ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆34Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- ☆59Updated 6 months ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Updated last year
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Updated 3 years ago
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.☆49Updated 9 months ago