ivan-sincek / domain-extractor
Extract valid or partially valid domain names and IPs from malicious or invalid URLs.
☆8Updated last year
Alternatives and similar repositories for domain-extractor:
Users that are interested in domain-extractor are comparing it to the libraries listed below
- This is the ToRat client, a part of the ToRat Project.☆27Updated 5 years ago
- Tool useful to discover services behind unknown ports☆13Updated 3 years ago
- Spider or repeater to find all links.☆13Updated 4 years ago
- Finder Predator The Thief botnet panel☆7Updated 5 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆10Updated 5 years ago
- Clone repository for Source Code secret anti-forensic tools Marble Framework CIA, Leaked by WikiLeaks.☆30Updated 8 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- A crack 💥 version of Ghostify, that helps you view Instagram stories without a trace (the story owner won't know you saw their story!)☆8Updated 2 years ago
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆8Updated 2 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 7 years ago
- A simple AES malware crypter☆16Updated 7 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆13Updated 8 years ago
- Windows productivity tweaks☆15Updated 5 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆24Updated 4 years ago
- Inject Metasploit Shell Code in Legitimate Process☆11Updated 4 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 10 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆12Updated 2 years ago
- A Tool For Crypt File And Bypass AntiVirus Even msfvenom Payloads☆19Updated 5 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆35Updated 4 months ago
- Brute force a REST API query through WebSocket. Based on cURL.☆9Updated last year
- Conquer the deep ocean, host an .onion site fast!☆15Updated 2 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 4 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Advanced Phishing Attack.☆11Updated 4 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆13Updated 4 years ago
- Light C++ Logger Library☆18Updated 7 years ago
- Remote Administration Tool For Windows VB.NET☆10Updated 6 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Updated 3 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 5 years ago