lkarlslund / topdomains
Top 17 million most popular domains as CSV (from Google CRUX dataset)
☆27Updated last year
Alternatives and similar repositories for topdomains:
Users that are interested in topdomains are comparing it to the libraries listed below
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆17Updated 2 months ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆25Updated last year
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 5 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Updated 6 months ago
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆23Updated 2 years ago
- DataReaper is a powerful Python tool designed to harvest data from publicly accessible HTTP servers. It combines the capabilities of Shod…☆11Updated last year
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆32Updated last week
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆38Updated 5 months ago
- S3 bucket enumerator☆29Updated 5 years ago
- ☆36Updated 3 weeks ago
- Working repo used to experiment with various languages as it relates to offensive security & evasion.☆31Updated 8 months ago
- crtdumper is a Go application designed to interact directly with Certificate Transparency (CT) logs servers and extract domain names fro…☆25Updated 7 months ago
- A utility to quickly map IP addresses to their respective ASN☆15Updated last year
- Monitor your target continuously for new subdomains!☆26Updated last year
- Finds Domain Controller on a network, enumerates users, AS-REP Roasting and hash cracking, bruteforces password, dumps AD users, DRSUAPI,…☆18Updated last year
- A script used to query the dehashed API and filter for more useful results☆15Updated 3 years ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆32Updated 9 months ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 2 years ago
- Tool for scanning domains for .git directories.☆12Updated last year
- ScrapeAW is a framework that without API scrape IPs across the world using Shodan☆11Updated 9 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆39Updated last year
- MAC Address brute forcing tool, used to bypass MAC based filtering☆14Updated 2 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 2 years ago
- ☆27Updated last year
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 10 months ago
- Python script implementing the favicon hash trick to find subdomains.☆28Updated last year
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- [experiment] Generate Nuclei templates for CVEs using chatGPT☆18Updated 3 months ago
- Use WordPress pingback.ping to transfer files.☆16Updated 11 months ago