magichk / magicspoofing
Magicspoofing it's a python script that checks & test SPF/DMARC DNS records an tries to spoof a domain with a open relay mail system.
☆45Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for magicspoofing
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆104Updated 5 months ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆47Updated 2 years ago
- ☆64Updated last year
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆31Updated 11 months ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆30Updated 5 months ago
- Apache Tomcat exploit and Pentesting guide for penetration tester☆54Updated 2 years ago
- ☆69Updated 6 months ago
- PowerJoker is a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Each Execution.☆35Updated 7 months ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆48Updated 8 months ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- "🔍 Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results sto…☆22Updated 9 months ago
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆84Updated last year
- Hit valid URL☆22Updated 2 years ago
- Sub-Domain TakeOver Vulnerability Scanner (edoardottt fork)☆40Updated this week
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆120Updated 2 months ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- A couple of different scripts, made to automate attacks against NoSQL databases.☆55Updated 8 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆69Updated 2 months ago
- PACU - Phishing Automation & Campaigning Utility☆39Updated 2 years ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆60Updated 10 months ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆54Updated 2 years ago
- ☆47Updated 2 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆25Updated 2 years ago
- Mass bruteforce authentication of network protocols☆44Updated 11 months ago
- Goblyn is a Python tool focused to enumeration and capture of website files metadata.☆70Updated 3 years ago
- Exploiting the xmlrpc.php on all WordPress versions☆23Updated 2 years ago
- SQLMutant is a comprehensive SQL injection testing tool that provides several features to test for SQL injection vulnerabilities in web a…☆113Updated 2 months ago
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆30Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆129Updated 4 months ago