The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains which are alive and then resolve them into IPs. Finally will run an Advanced level NMAP NSE scan on them.
☆15Nov 21, 2022Updated 3 years ago
Alternatives and similar repositories for domains-to-ip-resolvers
Users that are interested in domains-to-ip-resolvers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This tool will help in generating reverse shells easily for all types of OS.☆19Aug 4, 2023Updated 2 years ago
- Fully FUD keylogger that can bypass windows 11 & windows 10 defender protection and all kinds of Antivirus protections also.☆19Oct 9, 2021Updated 4 years ago
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.☆10Aug 4, 2023Updated 2 years ago
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆27Nov 17, 2021Updated 4 years ago
- Tutorials and Things to Do while Hunting Vulnerability.☆10May 15, 2025Updated 11 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A small and an efficient tool to find SQL injection vulnerability in a websites.☆28Nov 21, 2022Updated 3 years ago
- A Simple Script For SSH BruteForce☆38Aug 4, 2023Updated 2 years ago
- This script will install all the essential bug bounty tools and will find some basic vulns. I made this script for my daily hunting. The …☆44Mar 3, 2022Updated 4 years ago
- An Advanced tool to scan hundreds of IP's in Seconds for CVE's, Open Ports And Web Technologies.☆22Apr 30, 2022Updated 4 years ago
- A small tool to find admin panel of the website☆20Nov 21, 2022Updated 3 years ago
- A small and efficient tool to find open redirect vulnerabilities.☆17Sep 24, 2021Updated 4 years ago
- A small and fast bash script to automate LFI vulnerability.☆11Nov 21, 2022Updated 3 years ago
- An Effiecent Tool To Change Tor IP's in Seconds,change mac address and clean all logs☆40Oct 28, 2021Updated 4 years ago
- The purpose of this tool is to automate the payload Creation Process. U can Create Payloads For All Types of OS in Seconds.☆66Dec 11, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Generate FUD Droppers that are undetectable by popular AV's☆32Oct 21, 2023Updated 2 years ago
- A very user friendly and advanced phishing toolkit made for hackers☆41Dec 2, 2021Updated 4 years ago
- A simple script to obfuscate batch(bat) code easily☆25Oct 21, 2023Updated 2 years ago
- An OSINT tool to find user's all over the internet including social media platforms☆114Oct 10, 2023Updated 2 years ago
- Hack The Box writeups by Şefik Efe.☆15Oct 30, 2023Updated 2 years ago
- The purpose of this tool is to test the window10 defender protection and also other antivirus protection.☆95Aug 4, 2023Updated 2 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆14Apr 17, 2022Updated 4 years ago
- An Advanced Tool to Crack Any Password Protected ZIP File With different Techniques. A very Beginner Friendly Script For Newbies.☆111Sep 17, 2025Updated 7 months ago
- CROSS PLATFORM MULTI NETCAT SERVER☆13Sep 17, 2025Updated 7 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- fork from https://bitbucket.org/psiphon/psiphon-circumvention-system/☆15Jan 16, 2016Updated 10 years ago
- An Advanced tool to Crack Any Password Protected PDF file. A very user friendly script especially for noob hackers.☆75Aug 15, 2023Updated 2 years ago
- GENERATE PYTHON BASED FUD STUB☆22Nov 20, 2023Updated 2 years ago
- A small script to find the exact Geo-location of IP☆40Nov 21, 2022Updated 3 years ago
- Generate Undetectable Metasploit Payload in a simple way☆37Dec 19, 2023Updated 2 years ago
- A Fully Undectable RAT for Windows that bypass every kind of Antivirus Protections and will give u a CMD shell in your terminal☆48Aug 4, 2023Updated 2 years ago
- ☆12Dec 19, 2023Updated 2 years ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆17Mar 1, 2023Updated 3 years ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆16Aug 4, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- A Telegram Bot that let you download .apk from Google Play☆21Apr 26, 2016Updated 10 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆77Oct 21, 2023Updated 2 years ago
- ☆43Apr 27, 2026Updated last week
- ☆16Nov 12, 2024Updated last year
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago