Snapshot of North Korea's DNS data taken from zone transfers.
☆1,747Sep 23, 2016Updated 9 years ago
Alternatives and similar repositories for NorthKoreaDNSLeak
Users that are interested in NorthKoreaDNSLeak are comparing it to the libraries listed below
Sorting:
- TLDR (TLD Records) is a continually updated DNS archive of zone transfer attempts again all existing TLD nameservers as well as the root …☆519Sep 29, 2022Updated 3 years ago
- Summary and archives of leaked Russian TLD DNS data☆188Jun 20, 2017Updated 8 years ago
- Nameserver DNS poisoning attacks made easy☆524Feb 26, 2017Updated 9 years ago
- Leaked Mirai Source Code for Research/IoC Development Purposes☆9,224Oct 16, 2025Updated 4 months ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Oct 24, 2016Updated 9 years ago
- Collection of IOCs related to targeting of civil society☆189Nov 11, 2021Updated 4 years ago
- Top Level Domain data☆71Dec 8, 2019Updated 6 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆6,446Nov 26, 2018Updated 7 years ago
- Summary and archives of leaked Vietnam TLD DNS data☆46Sep 4, 2017Updated 8 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆700May 13, 2022Updated 3 years ago
- Dynamic DNS Update Bruteforce Tool☆29Feb 8, 2017Updated 9 years ago
- Original Apollo 11 Guidance Computer (AGC) source code for the command and lunar modules.☆64,634Jan 22, 2026Updated last month
- A list of all FTP servers in IPv4 that allow anonymous logins.☆657Apr 27, 2025Updated 10 months ago
- Wannacry in-memory key recovery☆1,089Jun 3, 2017Updated 8 years ago
- Archived list of domains using Cloudflare DNS at the time of the CloudBleed announcement.☆1,923Mar 14, 2017Updated 8 years ago
- Scans of North Korean IP Space☆192Apr 9, 2020Updated 5 years ago
- 3D reproduction of TSA Master keys☆3,239May 25, 2022Updated 3 years ago
- Platform to host Capture the Flag competitions☆6,568Dec 5, 2023Updated 2 years ago
- A demo of overriding what's in a person's clipboard☆1,435Jan 2, 2024Updated 2 years ago
- Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.☆7,320Jul 27, 2021Updated 4 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆43Feb 6, 2019Updated 7 years ago
- Decrypted content of eqgrp-auction-file.tar.xz☆4,198May 24, 2017Updated 8 years ago
- Make Python great again☆7,605Dec 4, 2019Updated 6 years ago
- An example of obtaining RCE via Redis and CSRF☆76Sep 11, 2016Updated 9 years ago
- A command line tool that recreates the famous data decryption effect seen in the 1992 movie Sneakers.☆7,758Dec 13, 2025Updated 2 months ago
- A framework for identifying and launching exploits against internal network hosts. Works via WebRTC IP enumeration combined with WebSocke…☆551Nov 6, 2015Updated 10 years ago
- Library and command line tool to detect SHA-1 collision in a file☆1,387Oct 30, 2025Updated 4 months ago
- The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.☆47,607Apr 18, 2024Updated last year
- 📡 A python program to create a fake AP and sniff data.☆1,691Nov 3, 2019Updated 6 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆4,096Jul 3, 2022Updated 3 years ago
- TLDR 2 (TLD Records 2) is a continually updated DNS archive of zone transfer attempts against all existing TLD nameservers as well as the…☆76Oct 16, 2025Updated 4 months ago
- Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices☆12,052Updated this week
- Proof of Concept code for CVE-2016-5696☆102Aug 24, 2016Updated 9 years ago
- Fancy Bear Source Code☆262Jan 9, 2017Updated 9 years ago
- WarBerryPi - Tactical Exploitation☆2,224Nov 9, 2019Updated 6 years ago
- Listen to music generated by events happening across GitHub 🎷☆1,756May 25, 2025Updated 9 months ago
- « usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.☆4,573Mar 1, 2024Updated 2 years ago
- Dirty COW☆3,436Aug 12, 2019Updated 6 years ago
- Automated wanadecrypt with key recovery if lucky☆795Jun 11, 2017Updated 8 years ago