☆22Oct 13, 2017Updated 8 years ago
Alternatives and similar repositories for dnsutils
Users that are interested in dnsutils are comparing it to the libraries listed below
Sorting:
- 一个监控 pastebin 的敏感内容,并发微博的 bot☆15Sep 12, 2017Updated 8 years ago
- ☆14May 13, 2018Updated 7 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- fix time for java application using javaAgent☆24Dec 3, 2017Updated 8 years ago
- Vulhub's homepage☆30Feb 5, 2026Updated 3 weeks ago
- ☆28Oct 16, 2017Updated 8 years ago
- Running mirai botnet in lab environment☆10Apr 9, 2017Updated 8 years ago
- ☆15Feb 22, 2021Updated 5 years ago
- CVE-2017-5721 Proof-of-Concept☆17Oct 23, 2017Updated 8 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- Parses Java Cache IDX files☆40Feb 28, 2018Updated 8 years ago
- Simple python script to scan some weak things.☆14Nov 2, 2015Updated 10 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆49Feb 15, 2017Updated 9 years ago
- Struts2の脆弱性S2-045, S2-055 および Jackson の脆弱性 CVE-2017-7525, CVE-2017-15095 の調査報告☆107Dec 13, 2017Updated 8 years ago
- Tool that dumps beacon frames to a pcap file. Works on Windows Vista or Later with any Wireless Card.☆27Mar 19, 2022Updated 3 years ago
- cve-2014-0130 rails directory traversal vuln☆19May 15, 2017Updated 8 years ago
- JavaScript exploit : Firefox version 41 - 50 are affected. Easy fix by disabling JavaScript (use NoScript for better leverage). Victim mu…☆20Jan 22, 2017Updated 9 years ago
- 一些漏洞场景的还原,基于https://www.exploit-db.com/☆37Feb 7, 2018Updated 8 years ago
- Proof-of-Concept exploits for D-Link DIR8xx routers☆37Sep 12, 2017Updated 8 years ago
- Python and Machine Learning Workshop at Hack.lu 2017☆82May 18, 2018Updated 7 years ago
- Some of my Nmap scripts☆22Aug 3, 2017Updated 8 years ago
- Dexaran's Naming Service☆20Mar 22, 2023Updated 2 years ago
- Malicious PDF document parsing tool☆16Nov 1, 2017Updated 8 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year
- Web&Browser Security☆43Sep 27, 2022Updated 3 years ago
- Break Apps with Frida workshop material☆46Oct 17, 2017Updated 8 years ago
- Map IPv4 addresses to Hilbert curves for data visualization☆23Apr 25, 2012Updated 13 years ago
- plugin of ida with pin☆48Jan 25, 2021Updated 5 years ago
- Backdoor with Golang (Cross-Plateform)☆17Feb 17, 2022Updated 4 years ago
- Various tools to track the Mirai botnet☆20Nov 3, 2016Updated 9 years ago
- 从扫描器结果分离出的一些大公司泛解析ip列表☆60Jun 8, 2017Updated 8 years ago
- Some tools based on docker☆24Jul 28, 2020Updated 5 years ago
- This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office…☆97Nov 21, 2017Updated 8 years ago
- ☆22May 25, 2017Updated 8 years ago
- A sample IoT bot origin from Mirai☆20Mar 29, 2017Updated 8 years ago
- Burp Extension to manipulate AES encrypted payloads☆24Aug 2, 2017Updated 8 years ago
- BlackHat Europe 2017 Slides☆25Feb 15, 2018Updated 8 years ago
- CVE-2017-0213 for command line☆58Jul 1, 2017Updated 8 years ago