Passive-Recursive DNS daemon
☆26Sep 20, 2024Updated last year
Alternatives and similar repositories for PR-DNSd
Users that are interested in PR-DNSd are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Minimalistic WebUI for passiveDNS tool☆18May 6, 2021Updated 4 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 4 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- D4 core software (server and sample sensor client)☆43Dec 23, 2023Updated 2 years ago
- Enumerate AWS cloud resources based on provided credential☆52May 11, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ReconPal: Leveraging NLP for Infosec☆57May 23, 2022Updated 3 years ago
- OWASP Foundation Web Respository☆36Sep 1, 2021Updated 4 years ago
- ☆24Nov 19, 2024Updated last year
- Finding secrets in kernel and user memory☆117Sep 6, 2023Updated 2 years ago
- Argus is a system and network monitoring application☆14Jan 16, 2020Updated 6 years ago
- wat☆14Feb 2, 2016Updated 10 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆53Feb 22, 2024Updated 2 years ago
- Windows offline filesystem hacking tool for Linux☆96Jun 24, 2022Updated 3 years ago
- A transform to show the latest copy of the website from the Wayback Machine☆17Nov 25, 2014Updated 11 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆72Apr 24, 2023Updated 3 years ago
- CVE-2020-36109 PoC causing DoS☆17Apr 20, 2022Updated 4 years ago
- Elasticsearch Stack Overflow Vulnerability☆18Sep 23, 2023Updated 2 years ago
- CVE-2022-32119 - Arox-Unrestricted-File-Upload☆17Dec 20, 2023Updated 2 years ago
- DNSrecon tool with GUI for Kali Linux☆60Dec 12, 2022Updated 3 years ago
- Find Email Spoofing Vulnerablity of domains☆95Jul 30, 2024Updated last year
- OpenGL interactive Hilbert curve IPv4 Heatmap☆20Mar 18, 2023Updated 3 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- Revival of the well known .NET debugger and assembly editor, dnSpy☆10Apr 27, 2026Updated last week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Explore CVE 2023-30845 automatically across multiple subdomains☆16Sep 30, 2023Updated 2 years ago
- CVE-2025-20029: Command Injection in TMSH CLI in F5 BIG-IP☆22Feb 23, 2025Updated last year
- Cobalt Strike DNS beacon parser☆11Nov 29, 2021Updated 4 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Mar 10, 2023Updated 3 years ago
- ☆121Sep 13, 2023Updated 2 years ago
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆26Dec 23, 2025Updated 4 months ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆43Jan 30, 2024Updated 2 years ago
- A Python script to find tenant id an region from a list of domain names.☆21Jan 31, 2025Updated last year
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)☆43Feb 19, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆13Dec 12, 2021Updated 4 years ago
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Jun 27, 2022Updated 3 years ago
- Vulcan2.0|分布式扫描器|漏洞扫描|指纹识别☆75Oct 27, 2021Updated 4 years ago
- Modular malware analysis artifact collection and correlation framework☆56Apr 23, 2024Updated 2 years ago
- Proxifier批量添加代理服务器☆19Jun 8, 2023Updated 2 years ago
- ☆10Aug 18, 2021Updated 4 years ago