This small utility retrieves from the CommonCrawl data set unique subdomains for a given domain name.
☆180Dec 25, 2025Updated 3 months ago
Alternatives and similar repositories for CCrawlDNS
Users that are interested in CCrawlDNS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool that turns the authoritative nameservers of DNS providers to resolvers and resolves the target domain list. Please think of this a…☆25Sep 19, 2019Updated 6 years ago
- Scan secrets from Continuous Integration Build Logs☆53Oct 14, 2019Updated 6 years ago
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆342Dec 6, 2018Updated 7 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Jul 6, 2019Updated 6 years ago
- Finds Directory Listings or open S3 buckets from a list of URLs☆52Dec 1, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆14Feb 26, 2021Updated 5 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆186Nov 28, 2019Updated 6 years ago
- gathers the XSS cheatsheet payloads and creates a usable wordlist☆74Jan 4, 2021Updated 5 years ago
- Automatic tool for DNS rebinding-based SSRF attacks☆305Aug 21, 2020Updated 5 years ago
- Responder Windows Version Beta☆560Jul 30, 2024Updated last year
- ☆15Apr 27, 2020Updated 5 years ago
- A Python3 based single-file subdomain enumerator☆89Oct 5, 2019Updated 6 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆811Aug 28, 2022Updated 3 years ago
- A tool for automatically gathering sensitive information from exposed Jenkins servers☆104Dec 8, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆620Oct 6, 2025Updated 6 months ago
- perl, non-alphanumeric, php☆10Mar 16, 2017Updated 9 years ago
- notorious BIG IP☆15Aug 8, 2019Updated 6 years ago
- Common Web Managers Fuzz Wordlists☆176Jan 2, 2026Updated 3 months ago
- List DTDs and generate XXE payloads using those local DTDs.☆655Feb 21, 2024Updated 2 years ago
- Fetch known urls from AlienVault's Open Threat Exchange for given hosts☆63Jul 22, 2019Updated 6 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆448Sep 7, 2022Updated 3 years ago
- An hourly updated list of subdomains gathered from certificate transparency logs☆346Oct 13, 2021Updated 4 years ago
- Example VBA Macro for MacOS Mojave☆67Oct 31, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,463Mar 2, 2026Updated last month
- HTA encryption tool for RedTeams☆1,425Nov 9, 2022Updated 3 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆72Apr 22, 2018Updated 7 years ago
- Retrieve the complete build history for every job ever created and executed on a given Jenkins instance.☆66Apr 25, 2025Updated 11 months ago
- NSE script to automatically discover SD-WAN nodes☆23Sep 4, 2019Updated 6 years ago
- Abusing Exchange via EWS☆153Sep 14, 2020Updated 5 years ago
- Simple python script to check against hypothetical JWT vulnerability.☆51Nov 29, 2020Updated 5 years ago
- A collection of tools for every PENTEST engagement☆12Oct 21, 2019Updated 6 years ago
- Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.☆1,555Mar 7, 2024Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- SilkETW & SilkService☆40Aug 14, 2019Updated 6 years ago
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆471Nov 14, 2019Updated 6 years ago
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆397Apr 17, 2020Updated 6 years ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆761Sep 23, 2024Updated last year
- ASN target organization IP range attack surface mapping for reconnaissance, fast and lightweight☆219Apr 10, 2022Updated 4 years ago
- lateral movement techniques that can be used during red team exercises☆278Jan 13, 2020Updated 6 years ago
- A C# implementation of PrivExchange by @_dirkjan.☆155Mar 15, 2019Updated 7 years ago