DNS-Discovery is a multithreaded subdomain bruteforcer.
☆150Jan 4, 2020Updated 6 years ago
Alternatives and similar repositories for DNS-Discovery
Users that are interested in DNS-Discovery are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Metasploit exploit suggester using OpenVAS XML output☆18Jun 30, 2018Updated 7 years ago
- Vulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.☆577Mar 8, 2023Updated 3 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- ☆10May 12, 2017Updated 9 years ago
- ☆19Dec 8, 2014Updated 11 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- iknowthis Linux SystemCall Fuzzer☆20Apr 18, 2019Updated 7 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- Wrapper around LinkFinder to quickly determine whether endpoints have been added/removed to JavaScript files.☆41Dec 27, 2019Updated 6 years ago
- Hyper-V virtual switch packet capturing extension with libpcap / Wireshark format☆13Jun 3, 2014Updated 11 years ago
- Labs from our workshop "Demystifying the server-side".☆17May 30, 2022Updated 3 years ago
- Subdomain brute force focused on speed and data serialization☆76Dec 27, 2022Updated 3 years ago
- The format of various s3 buckets is convert in one format. for bugbounty and security testing.☆87May 6, 2023Updated 3 years ago
- "Polymorphic" shellcode generator (x86)☆28Oct 28, 2014Updated 11 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆16Aug 26, 2013Updated 12 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Command List for Hashcat and default keyspaces.☆17Feb 13, 2020Updated 6 years ago
- A tool that turns the authoritative nameservers of DNS providers to resolvers and resolves the target domain list. Please think of this a…☆25Sep 19, 2019Updated 6 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆162Aug 5, 2016Updated 9 years ago
- This tool can be used to brute discover GET and POST parameters☆1,396Aug 24, 2019Updated 6 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- A DNS meta-query spider that enumerates DNS records, and subdomains.☆3,511Jan 13, 2022Updated 4 years ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- An extremely fast and flexible web fuzzer☆223Feb 25, 2023Updated 3 years ago
- Digital Forensics and Incident Response Wiki☆40May 19, 2014Updated 12 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A kinda reckless dns resolver. Still under development.☆16Mar 23, 2020Updated 6 years ago
- An automation framework for running multiple open sourced subdomain bruteforcing tools (in parallel) using your own wordlists via Docker …☆259Aug 22, 2021Updated 4 years ago
- A Python script to parse net blocks & domain names from SPF record☆84Jun 2, 2020Updated 5 years ago
- It's a tool to manage vulnerables packages in your *nix server, in a centralized way☆30Dec 15, 2020Updated 5 years ago
- A bash script that will automatically install Bug Hunting tools used for recon☆180Jul 6, 2023Updated 2 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆26Jan 29, 2018Updated 8 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- Encrypting VHD parser driver for Hyper-V☆10Apr 22, 2016Updated 10 years ago
- Uma lista de recursos para quem deseja aprender sobre Physical Pentesting☆12Jul 28, 2025Updated 9 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Knock Subdomain Scan☆4,164Feb 19, 2026Updated 3 months ago
- Metasploit Red Team Competition Modules☆13Apr 10, 2011Updated 15 years ago
- Wireless Miniaturized Device☆19Jan 27, 2018Updated 8 years ago
- ☆1,266Dec 17, 2024Updated last year
- Sniffs an interface/pcap file and concatenates fragmented packet loads☆22Feb 26, 2015Updated 11 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆116Mar 29, 2019Updated 7 years ago
- ☆277Oct 19, 2021Updated 4 years ago