Passive-Recursive DNS daemon
☆26Sep 20, 2024Updated last year
Alternatives and similar repositories for PR-DNSd
Users that are interested in PR-DNSd are comparing it to the libraries listed below
Sorting:
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 3 years ago
- ☆24Nov 19, 2024Updated last year
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- Enumerate AWS cloud resources based on provided credential☆51May 11, 2022Updated 3 years ago
- ReconPal: Leveraging NLP for Infosec☆57May 23, 2022Updated 3 years ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆98Jan 13, 2026Updated last month
- ☆13Dec 12, 2021Updated 4 years ago
- Explore CVE 2023-30845 automatically across multiple subdomains☆16Sep 30, 2023Updated 2 years ago
- ☆13Aug 1, 2017Updated 8 years ago
- CVE-2020-36109 PoC causing DoS☆17Apr 20, 2022Updated 3 years ago
- A Python script to find tenant id an region from a list of domain names.☆16Jan 31, 2025Updated last year
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)☆42Feb 19, 2025Updated last year
- OWASP Foundation Web Respository☆36Sep 1, 2021Updated 4 years ago
- Finding secrets in kernel and user memory☆117Sep 6, 2023Updated 2 years ago
- CVE-2022-32119 - Arox-Unrestricted-File-Upload☆17Dec 20, 2023Updated 2 years ago
- Windows Oracle Database Attack Toolkit☆80Jul 30, 2022Updated 3 years ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆43Jan 30, 2024Updated 2 years ago
- Proxifier批量添加代理服务器☆18Jun 8, 2023Updated 2 years ago
- CVE-2025-20029: Command Injection in TMSH CLI in F5 BIG-IP☆22Feb 23, 2025Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆51Feb 22, 2024Updated 2 years ago
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆26Dec 23, 2025Updated 2 months ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Mar 10, 2023Updated 2 years ago
- Windows offline filesystem hacking tool for Linux☆96Jun 24, 2022Updated 3 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Jun 27, 2022Updated 3 years ago
- 一个简单的指纹识别小工具☆21Oct 23, 2023Updated 2 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Dec 2, 2025Updated 3 months ago
- Modular malware analysis artifact collection and correlation framework☆54Apr 23, 2024Updated last year
- VMware vCenter Server任意文件上传漏洞 / Code By:Jun_sheng☆21Jul 8, 2022Updated 3 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- Find Email Spoofing Vulnerablity of domains☆96Jul 30, 2024Updated last year
- A WLAN red team framework.☆156Feb 9, 2026Updated 3 weeks ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Feb 15, 2024Updated 2 years ago
- A powerful and clean bash script to dump and extract information from Project Discovery's Chaos Project https://chaos.projectdiscovery.io…☆25Mar 31, 2022Updated 3 years ago
- Linux Evidence Acquisition Framework☆119Sep 30, 2024Updated last year
- Nuclei template and information about the POC for CVE-2024-25600☆31Feb 21, 2024Updated 2 years ago
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Dec 15, 2023Updated 2 years ago
- ☆30Jul 28, 2024Updated last year
- ☆27May 14, 2022Updated 3 years ago