Passive-Recursive DNS daemon
☆26Sep 20, 2024Updated last year
Alternatives and similar repositories for PR-DNSd
Users that are interested in PR-DNSd are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 4 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- Enumerate AWS cloud resources based on provided credential☆52May 11, 2022Updated 3 years ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆98Jan 13, 2026Updated 2 months ago
- ☆24Nov 19, 2024Updated last year
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- Finding secrets in kernel and user memory☆117Sep 6, 2023Updated 2 years ago
- Argus is a system and network monitoring application☆14Jan 16, 2020Updated 6 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Apr 20, 2021Updated 4 years ago
- wat☆14Feb 2, 2016Updated 10 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆52Feb 22, 2024Updated 2 years ago
- Windows offline filesystem hacking tool for Linux☆96Jun 24, 2022Updated 3 years ago
- A transform to show the latest copy of the website from the Wayback Machine☆17Nov 25, 2014Updated 11 years ago
- Elasticsearch Stack Overflow Vulnerability☆18Sep 23, 2023Updated 2 years ago
- CVE-2022-32119 - Arox-Unrestricted-File-Upload☆17Dec 20, 2023Updated 2 years ago
- DNSrecon tool with GUI for Kali Linux☆60Dec 12, 2022Updated 3 years ago
- 機械学習モデルの実装だったり色々な手法を試したときのJupyter Notebook☆14Dec 7, 2017Updated 8 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45May 25, 2023Updated 2 years ago
- Windows Oracle Database Attack Toolkit☆80Jul 30, 2022Updated 3 years ago
- Find Email Spoofing Vulnerablity of domains☆97Jul 30, 2024Updated last year
- AutoBib: create beautiful bib files and html publication pages automagically☆14May 7, 2025Updated 10 months ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- Revival of the well known .NET debugger and assembly editor, dnSpy☆10Mar 16, 2026Updated last week
- Terraform playbook of a vulnerable Azure deployment☆11Apr 28, 2022Updated 3 years ago
- A Python script to find tenant id an region from a list of domain names.☆18Jan 31, 2025Updated last year
- Explore CVE 2023-30845 automatically across multiple subdomains☆16Sep 30, 2023Updated 2 years ago
- CVE-2025-20029: Command Injection in TMSH CLI in F5 BIG-IP☆22Feb 23, 2025Updated last year
- Cobalt Strike DNS beacon parser☆11Nov 29, 2021Updated 4 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Mar 10, 2023Updated 3 years ago
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆68Mar 4, 2023Updated 3 years ago
- Linux Evidence Acquisition Framework☆119Sep 30, 2024Updated last year
- ☆121Sep 13, 2023Updated 2 years ago
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆26Dec 23, 2025Updated 3 months ago
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)☆42Feb 19, 2025Updated last year
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆43Jan 30, 2024Updated 2 years ago
- ☆13Dec 12, 2021Updated 4 years ago
- 🍛 TypeScript Options-object Currying☆13Dec 9, 2019Updated 6 years ago
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- Vulcan2.0|分布式 扫描器|漏洞扫描|指纹识别☆75Oct 27, 2021Updated 4 years ago