mandatoryprogrammer / NorthKoreaDNSLeakView external linksLinks
Snapshot of North Korea's DNS data taken from zone transfers.
☆1,745Sep 23, 2016Updated 9 years ago
Alternatives and similar repositories for NorthKoreaDNSLeak
Users that are interested in NorthKoreaDNSLeak are comparing it to the libraries listed below
Sorting:
- TLDR (TLD Records) is a continually updated DNS archive of zone transfer attempts again all existing TLD nameservers as well as the root …☆521Sep 29, 2022Updated 3 years ago
- Summary and archives of leaked Russian TLD DNS data☆187Jun 20, 2017Updated 8 years ago
- Nameserver DNS poisoning attacks made easy☆525Feb 26, 2017Updated 8 years ago
- Leaked Mirai Source Code for Research/IoC Development Purposes☆9,168Oct 16, 2025Updated 3 months ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Oct 24, 2016Updated 9 years ago
- Collection of IOCs related to targeting of civil society☆189Nov 11, 2021Updated 4 years ago
- Top Level Domain data☆71Dec 8, 2019Updated 6 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆6,441Nov 26, 2018Updated 7 years ago
- Summary and archives of leaked Vietnam TLD DNS data☆46Sep 4, 2017Updated 8 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆697May 13, 2022Updated 3 years ago
- Dynamic DNS Update Bruteforce Tool☆29Feb 8, 2017Updated 9 years ago
- Original Apollo 11 Guidance Computer (AGC) source code for the command and lunar modules.☆64,585Jan 22, 2026Updated 3 weeks ago
- A list of all FTP servers in IPv4 that allow anonymous logins.☆657Apr 27, 2025Updated 9 months ago
- Wannacry in-memory key recovery☆1,089Jun 3, 2017Updated 8 years ago
- Archived list of domains using Cloudflare DNS at the time of the CloudBleed announcement.☆1,922Mar 14, 2017Updated 8 years ago
- Scans of North Korean IP Space☆192Apr 9, 2020Updated 5 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆42Feb 6, 2019Updated 7 years ago
- 3D reproduction of TSA Master keys☆3,240May 25, 2022Updated 3 years ago
- Platform to host Capture the Flag competitions☆6,570Dec 5, 2023Updated 2 years ago
- A demo of overriding what's in a person's clipboard☆1,434Jan 2, 2024Updated 2 years ago
- Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.☆7,310Jul 27, 2021Updated 4 years ago
- Decrypted content of eqgrp-auction-file.tar.xz☆4,198May 24, 2017Updated 8 years ago
- Make Python great again☆7,599Dec 4, 2019Updated 6 years ago
- An example of obtaining RCE via Redis and CSRF☆76Sep 11, 2016Updated 9 years ago
- A command line tool that recreates the famous data decryption effect seen in the 1992 movie Sneakers.☆7,747Dec 13, 2025Updated 2 months ago
- A framework for identifying and launching exploits against internal network hosts. Works via WebRTC IP enumeration combined with WebSocke…☆551Nov 6, 2015Updated 10 years ago
- Library and command line tool to detect SHA-1 collision in a file☆1,385Oct 30, 2025Updated 3 months ago
- The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.☆47,584Apr 18, 2024Updated last year
- 📡 A python program to create a fake AP and sniff data.☆1,691Nov 3, 2019Updated 6 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆4,089Jul 3, 2022Updated 3 years ago
- Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices☆12,044Updated this week
- Proof of Concept code for CVE-2016-5696☆102Aug 24, 2016Updated 9 years ago
- Fancy Bear Source Code☆263Jan 9, 2017Updated 9 years ago
- WarBerryPi - Tactical Exploitation☆2,225Nov 9, 2019Updated 6 years ago
- « usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.☆4,572Mar 1, 2024Updated last year
- Listen to music generated by events happening across GitHub 🎷☆1,755May 25, 2025Updated 8 months ago
- Dirty COW☆3,433Aug 12, 2019Updated 6 years ago
- Automated wanadecrypt with key recovery if lucky☆796Jun 11, 2017Updated 8 years ago
- Based on a true story☆49,409Oct 23, 2023Updated 2 years ago