Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?
☆15Sep 20, 2024Updated last year
Alternatives and similar repositories for risky-records
Users that are interested in risky-records are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- Lambda function that automatically create or update AWS resource with AWS service's IP ranges from the ip-ranges.json file. You can confi…☆17Jul 2, 2024Updated last year
- This project automates setup of Cost and Usage Reports (CUR) in a billing account with an Athena table enabling querying of the latest da…☆13Apr 8, 2026Updated last month
- A Python script to authenticate and test access to Google Cloud Platform (GCP) resources.☆17Jan 31, 2024Updated 2 years ago
- Inject code into .net applications☆13Nov 7, 2018Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- An AWS IAM Privilege Escalation Path Library☆129Apr 27, 2026Updated last week
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- Recon tool to query cloud prefixes for services associated with an IP address☆22Oct 2, 2024Updated last year
- Tools for GitHub issue and milestone consolidation across projects.☆63May 27, 2015Updated 10 years ago
- Prowler Studio an AI workflow that ensures Claude Code follows Prowler's guardrails to deliver consistent, tested, and PR-ready threat de…☆50Updated this week
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Saludetes tipicos☆10Oct 11, 2023Updated 2 years ago
- ☆149Feb 26, 2026Updated 2 months ago
- CloudSec Tools is a curated collection of open-source cloud security tools, helping security professionals, researchers, and engineers fi…☆22Apr 30, 2026Updated last week
- Red Team Projects with chat.openai.com.☆17Apr 3, 2023Updated 3 years ago
- This Chromium extension scans the page for external iFrames, Scripts, and Styles, logs them to the console, and checks if their domains a…☆68Jan 6, 2026Updated 4 months ago
- ☆11Feb 14, 2025Updated last year
- Palo Alto Networks AI Runtime Security Model Context Protocol (MCP) Relay Server☆33Jan 27, 2026Updated 3 months ago
- Reverser - A Quick Reverse Connection Deployment Script☆12Jun 22, 2012Updated 13 years ago
- A password cracking IRC bot☆18May 24, 2014Updated 11 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆13May 4, 2014Updated 12 years ago
- Python implementation of a Bugcrowd api client.☆11Nov 20, 2025Updated 5 months ago
- Repository of Volatility3 plugins☆22Mar 22, 2023Updated 3 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- OAuth 2.0 exploitation, attack and research tools.☆13Jan 20, 2024Updated 2 years ago
- For unpacking base64:ed "Save items"-content from Burp (From search + proxy history)☆54Feb 26, 2025Updated last year
- Take back your attention, Hit RESET on your digital life.☆15Feb 7, 2021Updated 5 years ago
- ☆13Nov 5, 2024Updated last year
- Argument Injection in Dragonfly Ruby Gem☆16May 26, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A simple script that generates an Excel friendly CSV file from an Amass JSON file.☆13May 6, 2022Updated 4 years ago
- Repository for CoSAI Workstream 4, Secure Design Patterns for Agentic Systems☆103Updated this week
- Highlight Burp proxy requests made by different browsers☆29Sep 21, 2017Updated 8 years ago
- Blow off steam by destroying your editor with bullets, hammers, and flamethrowers. A fun break during frustrating coding sessions!☆12Mar 14, 2025Updated last year
- How to write basic memory corruption exploits on Windows☆28Sep 14, 2016Updated 9 years ago
- Slack alert bot for matching Github Audit Events☆10Nov 12, 2024Updated last year
- GenZ Shellcode Generator to execute commands with winExec API☆22Apr 27, 2025Updated last year