lgandx / CCrawlDNSView external linksLinks
This small utility retrieves from the CommonCrawl data set unique subdomains for a given domain name.
☆180Dec 25, 2025Updated last month
Alternatives and similar repositories for CCrawlDNS
Users that are interested in CCrawlDNS are comparing it to the libraries listed below
Sorting:
- A tool that turns the authoritative nameservers of DNS providers to resolvers and resolves the target domain list. Please think of this a…☆25Sep 19, 2019Updated 6 years ago
- Small fuzzing library with an example script using it.☆21Feb 12, 2021Updated 5 years ago
- Finds Directory Listings or open S3 buckets from a list of URLs☆52Dec 1, 2021Updated 4 years ago
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆345Dec 6, 2018Updated 7 years ago
- Scan secrets from Continuous Integration Build Logs☆53Oct 14, 2019Updated 6 years ago
- Automatic tool for DNS rebinding-based SSRF attacks☆304Aug 21, 2020Updated 5 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆186Nov 28, 2019Updated 6 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Jul 6, 2019Updated 6 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆72Apr 22, 2018Updated 7 years ago
- A tool for automatically gathering sensitive information from exposed Jenkins servers☆104Dec 8, 2022Updated 3 years ago
- gathers the XSS cheatsheet payloads and creates a usable wordlist☆74Jan 4, 2021Updated 5 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆620Oct 6, 2025Updated 4 months ago
- HTA encryption tool for RedTeams☆1,425Nov 9, 2022Updated 3 years ago
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆14Feb 26, 2021Updated 4 years ago
- notorious BIG IP☆15Aug 8, 2019Updated 6 years ago
- Simple python script to check against hypothetical JWT vulnerability.☆51Nov 29, 2020Updated 5 years ago
- Brute force attack tool for Azure AD Autologon/Seamless SSO - Source: https://arstechnica.com/information-technology/2021/09/new-azure-ac…☆106Jun 27, 2024Updated last year
- List DTDs and generate XXE payloads using those local DTDs.☆645Feb 21, 2024Updated last year
- An hourly updated list of subdomains gathered from certificate transparency logs☆349Oct 13, 2021Updated 4 years ago
- Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack☆41Dec 23, 2022Updated 3 years ago
- Abusing Exchange via EWS☆152Sep 14, 2020Updated 5 years ago
- A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the ac…☆1,073Mar 19, 2024Updated last year
- lateral movement techniques that can be used during red team exercises☆273Jan 13, 2020Updated 6 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆811Aug 28, 2022Updated 3 years ago
- take a list of resolved subdomains and output any corresponding CNAMES en masse.☆18Jan 29, 2026Updated 2 weeks ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆504Sep 23, 2025Updated 4 months ago
- ☆24Sep 28, 2022Updated 3 years ago
- Example VBA Macro for MacOS Mojave☆66Oct 31, 2018Updated 7 years ago
- Common Web Managers Fuzz Wordlists☆175Jan 2, 2026Updated last month
- Extension adds a new tab in Burp Suite called Extractor☆42Apr 13, 2019Updated 6 years ago
- A Python3 based single-file subdomain enumerator☆91Oct 5, 2019Updated 6 years ago
- Golang IPv6 address enumeration☆358May 27, 2019Updated 6 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,416Jan 13, 2026Updated last month
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆760Sep 23, 2024Updated last year
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆470Nov 14, 2019Updated 6 years ago
- Retrieve the complete build history for every job ever created and executed on a given Jenkins instance.☆67Apr 25, 2025Updated 9 months ago
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆398Apr 17, 2020Updated 5 years ago
- A toolkit to attack Office365☆1,114Nov 6, 2020Updated 5 years ago
- A C# implementation of PrivExchange by @_dirkjan.☆155Mar 15, 2019Updated 6 years ago