Scan IPv4 prefixes for DNS revolvers and classify them as open/closed
☆10Jun 19, 2014Updated 11 years ago
Alternatives and similar repositories for dnsscan
Users that are interested in dnsscan are comparing it to the libraries listed below
Sorting:
- Proof-of-Concept python script that implements DNS spoofing attack in Kubernetes environment from a pod located on a Worker server☆15Feb 4, 2021Updated 5 years ago
- Kubernetes Security Testing Guide☆26Apr 22, 2024Updated last year
- Arp spoof detection tool☆26Jun 30, 2017Updated 8 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆65Jan 11, 2023Updated 3 years ago
- Integrate handcrafted binary and documentation☆36Oct 20, 2025Updated 4 months ago
- A Practical Quiz on Software Engineering and Webtech☆23Apr 15, 2023Updated 2 years ago
- Resurrecting and updating the best log cleaner☆36Jan 2, 2015Updated 11 years ago
- ☆37Dec 26, 2021Updated 4 years ago
- Slides, collaboration doc, and code building a recommendation system example presented in a meetup talks☆14Sep 24, 2020Updated 5 years ago
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 3 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- MATLAB Implementation of Harmony Search, a nature inspired optimization algorithm☆10Dec 1, 2016Updated 9 years ago
- A thread dump analyzer tool running on your browser or in your JVM that generates DOT documents out of `jstack` outputs.☆10Jul 10, 2024Updated last year
- MIDI Synthesizer for Arduino☆10Dec 7, 2015Updated 10 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- Workshop - Windows Container☆11Dec 20, 2017Updated 8 years ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 9 months ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 2 months ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Burp Enterprise Toolkit☆12Feb 25, 2022Updated 4 years ago
- Photo forensics tool that detects alteration of JPEG images☆10May 13, 2021Updated 4 years ago
- A kernel module that lists all current tasks in a Linux system☆15Dec 13, 2015Updated 10 years ago
- Tool for decrypting files encrypted by the SynoLocker ransomware☆15Aug 22, 2014Updated 11 years ago
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Sep 11, 2020Updated 5 years ago
- ☆16Jul 21, 2018Updated 7 years ago
- Gradle plugin for integrating with HCL AppScan Source☆13Jan 29, 2026Updated last month
- ☆10Jun 10, 2024Updated last year
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- Sample code for ret2usr (and ret2dir) kernel attacks☆10Nov 23, 2016Updated 9 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Examples of programs written in several languages☆11Apr 18, 2023Updated 2 years ago
- Malware Analysis and Storage System - Server repository☆12Jul 15, 2022Updated 3 years ago
- ☆14Mar 8, 2021Updated 4 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- So you've decided to ruin your life and work with Bluetooth on windows☆13Jul 1, 2021Updated 4 years ago
- fanotify cron system☆21Sep 15, 2015Updated 10 years ago
- Portable C Compiler (CVS mirror)☆12Apr 9, 2012Updated 13 years ago
- ☆12Mar 31, 2021Updated 4 years ago