show which process did what DNS queries
☆36Jan 25, 2018Updated 8 years ago
Alternatives and similar repositories for dnssnoop
Users that are interested in dnssnoop are comparing it to the libraries listed below
Sorting:
- ☆12Jan 12, 2023Updated 3 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 5 years ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- Proof of concept for vulnerability management of Docker containers☆16May 4, 2017Updated 8 years ago
- this is some scripts for pentesting zabbix server☆13Feb 25, 2018Updated 8 years ago
- RubyGem: Logger for systemd-journal☆16Mar 30, 2022Updated 3 years ago
- Cisco Unfied Call Manager enumeration☆24Jul 13, 2022Updated 3 years ago
- CVE-2021-3378 | FortiLogger - Unauthenticated Arbitrary File Upload (Metasploit)☆22Feb 28, 2021Updated 5 years ago
- karma WiFi attack implementation☆56Oct 23, 2024Updated last year
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Aug 6, 2020Updated 5 years ago
- A simple DuckDuckGo URL scraper.☆32Feb 9, 2024Updated 2 years ago
- Nmap script to check vulnerability CVE-2021-21975☆27Apr 2, 2021Updated 4 years ago
- A multithreaded league of legends ping checker. Free download -☆13Jan 8, 2019Updated 7 years ago
- Tiny control wrapper for KVM☆29Jan 21, 2025Updated last year
- Tool to run commands via ssh on multiple hosts.☆29Jul 6, 2024Updated last year
- Shadowsocks-like proxy written in Go☆37Dec 18, 2019Updated 6 years ago
- interact with HackTheBox from your terminal☆24Jul 24, 2019Updated 6 years ago
- Cheatsheets on security vulnerabilities and exploits.☆35Jan 20, 2020Updated 6 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆32Oct 11, 2020Updated 5 years ago
- Yet Another Rsync: a file synchronization and backup tool☆40Jan 13, 2026Updated last month
- Be able to execute memory snapshots so they can start running where they left off.☆36Apr 14, 2015Updated 10 years ago
- YSOSERIAL Integration with burp suite☆41Feb 10, 2022Updated 4 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 6 years ago
- Bypass Windows Defender with py2exe from memory.☆40Feb 10, 2022Updated 4 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- 之前的个人wiki。现在用 Blog 的形式来写了。这个wiki就放在这里吧。希望里面的内容能帮助到别人。☆10Apr 2, 2020Updated 5 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- Mode-line stopwatch in Emacs☆12Aug 27, 2019Updated 6 years ago
- A85 Cross Assembler☆15Jun 14, 2024Updated last year
- Radware Ansible Collection☆10Sep 27, 2023Updated 2 years ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 6 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- overview of interesting health and fitness OSS/FOSS apps and tools☆22Mar 1, 2026Updated last week
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- ☆11Jul 27, 2016Updated 9 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Set of tools to interface with Kodi☆13Jan 4, 2020Updated 6 years ago