EnumDNS is a modular DNS reconnaissance tool capable of resolving hosts from various sources, including wordlists, BloodHound files, and Active Directory environments.
☆21Mar 9, 2026Updated last month
Alternatives and similar repositories for enumdns
Users that are interested in enumdns are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- O Vansor Forensic Collector é um script de automação desenvolvido para coleta, validação e análise de dados em servidores Linux.☆12Sep 9, 2024Updated last year
- Multi-threading Leaks/Intelligence file parser☆16Mar 16, 2026Updated 3 weeks ago
- Translation of the book A Byte of Python to brazilian portuguese☆29May 12, 2016Updated 9 years ago
- Comunidade Brasileira de Cibersegurança☆24Oct 6, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Automate Maldoc creation☆24Apr 22, 2025Updated 11 months ago
- 「⚔️」Ring 0 Rootkit for Linux Kernels x86/x86_64 5.x/6.x☆26Apr 10, 2025Updated last year
- A better netcat for Hackers☆33Mar 31, 2026Updated last week
- ☆28Oct 4, 2021Updated 4 years ago
- Paypal Payments PHP Integration☆11Dec 17, 2018Updated 7 years ago
- A proof of concept for CVE-2023–1326 in apport-cli 2.26.0☆21Dec 6, 2023Updated 2 years ago
- Self-hosted tiny web C2 framework for dynamically managing PowerShell/BashScript payloads and collecting exfiltrated data☆19May 9, 2025Updated 11 months ago
- Dynamically deploy containers for CTF challenges.☆23Nov 29, 2025Updated 4 months ago
- ☆11Feb 25, 2026Updated last month
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Django middleware and signals for handling security events☆13Apr 14, 2021Updated 4 years ago
- Next.js React Server Components RCE exploit for CVE-2025-55182☆58Dec 5, 2025Updated 4 months ago
- setup wazuh to serve multiple organizations on a single instance.☆11Dec 29, 2023Updated 2 years ago
- This is a smart contract tutorial, this tutorial guide you how to compile & deploy a mintable ERC20 token smart contract using client sid…☆13Oct 6, 2018Updated 7 years ago
- A minimal MCP Server based on the Anthropic's "think" tool research☆24Aug 1, 2025Updated 8 months ago
- Base OKE automated deployment with extras, to be used alone or by other Quickstarts☆13Jun 20, 2025Updated 9 months ago
- ☆22Sep 20, 2025Updated 6 months ago
- This search engine automates the discovery of sensitive information using customized dorks across GitHub, Google, and Shodan.☆16Oct 16, 2024Updated last year
- Enrich your investigations on IPs, Domains etc. with OSINT☆60Apr 4, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆18Oct 20, 2021Updated 4 years ago
- Git-eXposed is a tool designed to detect and extract sensitive information from exposed Git repositories☆11Sep 26, 2024Updated last year
- CVEs for Integrated Dell Remote Access Controller (iDRAC)☆23Updated this week
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆28Jun 14, 2024Updated last year
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Jun 25, 2025Updated 9 months ago
- ☆77Nov 13, 2025Updated 4 months ago
- Code for ESP8266 for controlling lamp relay and many more☆11Mar 28, 2019Updated 7 years ago
- A way to maintain long-term access to Windows LAPS for lateral movement in AD via installing an Offensive LAPS RPC backdoor on a DC.☆30Jun 9, 2025Updated 10 months ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Dec 10, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Create an Arduino Sketch from a PowerPoint presentation☆15Jan 27, 2022Updated 4 years ago
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity ta…☆34Mar 8, 2026Updated last month
- Plataforma de CTI Assíncrona focada em Crimes Financeiros (Pix/Cripto) e Compliance Regulatório (Lei 14.790). Powered by LangGraph & Asyn…☆40Jan 14, 2026Updated 2 months ago
- ☆17Apr 3, 2026Updated last week
- ☆91Dec 15, 2025Updated 3 months ago
- A small and efficient tool to find open redirect vulnerabilities.☆17Sep 24, 2021Updated 4 years ago
- POC for CVE-2025-54918 and a technical demonstration.☆56Jan 12, 2026Updated 2 months ago