ivan-sincek / domain-extractorLinks
Extract valid or partially valid domain names and IPs from malicious or invalid URLs.
☆8Updated 2 years ago
Alternatives and similar repositories for domain-extractor
Users that are interested in domain-extractor are comparing it to the libraries listed below
Sorting:
- This is the ToRat client, a part of the ToRat Project.☆26Updated 5 years ago
- Python module to ease writing scripts go over big amount of data in order to perform the same actions. A simple preconfigured threads and…☆12Updated 5 years ago
- Uses NASM Shell Tool from Metasploit to friendly export Python / C / CPP shellcode from assembly instructions.☆16Updated 4 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆36Updated 6 months ago
- Clone repository for Source Code secret anti-forensic tools Marble Framework CIA, Leaked by WikiLeaks.☆31Updated 8 years ago
- Provides access to libhashcat☆30Updated last year
- Advanced Phishing Attack.☆11Updated 4 years ago
- Windows Malware monitors and infects specific kinds of files.☆17Updated 5 years ago
- Various Crypter Project☆9Updated 11 years ago
- Remove Offensive and Profane Words from Wordlists☆15Updated last year
- Notes and goodies to make binary exploitation life easier☆10Updated 6 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Golang tool to scan hosts for SMB version and signing status☆16Updated 7 months ago
- Finder Predator The Thief botnet panel☆7Updated 5 years ago
- golang program to parse Pastebin for keywords and send them per E-Mail☆33Updated 3 weeks ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- ☆28Updated 4 years ago
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆17Updated 4 years ago
- Graphing package for mapping and visualizing the Internet☆18Updated last year
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 4 years ago
- KeplerPulse is a tool that generates a Powershell command that once executed on a Machine, Downloads and executes your desired Executable…☆10Updated 3 years ago
- Command line Remote Access tool (RAT) targeting Windows Systems.☆15Updated 5 years ago
- Windows productivity tweaks☆15Updated 5 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 7 years ago
- Collection of exploits that were verified by an automated system☆13Updated 4 years ago
- arp-poison (aka arp spoof) tool☆40Updated 12 years ago
- The best way to send emails in Go.☆10Updated 4 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆10Updated 5 years ago
- Conquer the deep ocean, host an .onion site fast!☆16Updated 2 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 10 years ago