ivan-sincek / domain-extractor
Extract valid or partially valid domain names and IPs from malicious or invalid URLs.
☆8Updated last year
Alternatives and similar repositories for domain-extractor:
Users that are interested in domain-extractor are comparing it to the libraries listed below
- Finder Predator The Thief botnet panel☆7Updated 5 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆9Updated 4 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆10Updated 5 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆15Updated 2 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆35Updated last month
- A simple AES malware crypter☆16Updated 6 years ago
- This is the ToRat client, a part of the ToRat Project.☆27Updated 5 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆12Updated 3 years ago
- Spider or repeater to find all links.☆13Updated 4 years ago
- Various Crypter Project☆9Updated 10 years ago
- Password spraying toolkit☆7Updated 4 years ago
- PoC Remote Administration Tool☆11Updated 5 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 6 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- Remote Administration Tool For Windows VB.NET☆10Updated 5 years ago
- The best way to send emails in Go.☆10Updated 4 years ago
- Conquer the deep ocean, host an .onion site fast!☆15Updated 2 years ago
- Cpanel Brute Force Tool (Perl)☆16Updated 11 years ago
- module for certexfil☆15Updated 2 years ago
- golang program to parse Pastebin for keywords and send them per E-Mail☆33Updated this week
- A Tool For Crypt File And Bypass AntiVirus Even msfvenom Payloads☆19Updated 5 years ago
- Test Suite for John the Ripper☆25Updated 3 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 4 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆25Updated 7 years ago
- KeplerPulse is a tool that generates a Powershell command that once executed on a Machine, Downloads and executes your desired Executable…☆10Updated 3 years ago
- Light C++ Logger Library☆18Updated 7 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 5 years ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆9Updated 2 years ago