A passive scanning tool for finding expired domain vulnerabilities while you browse.
☆42Feb 6, 2019Updated 7 years ago
Alternatives and similar repositories for PERS
Users that are interested in PERS are comparing it to the libraries listed below
Sorting:
- Dynamic DNS Update Bruteforce Tool☆29Feb 8, 2017Updated 9 years ago
- Daily TLD health report generated using RIPE's DNSCheck against all existing TLDs.☆18Jan 25, 2017Updated 9 years ago
- Scans crossdomain.xml policies for expired domain names.☆26Aug 4, 2015Updated 10 years ago
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- LibreSSL with a backdoor in RSA key generation☆17Jun 26, 2016Updated 9 years ago
- "><script>prompt(1)</script>''"><!--<svg>☆18Nov 20, 2015Updated 10 years ago
- A tool for enumerating expired domains in CNAME records☆60Jun 30, 2016Updated 9 years ago
- Nameserver DNS poisoning attacks made easy☆526Feb 26, 2017Updated 9 years ago
- Proof of Concept code for CVE-2015-0345 (APSB15-07)☆22Jun 12, 2015Updated 10 years ago
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆22Nov 15, 2018Updated 7 years ago
- A very simple bridge for performing Flash HTTP requests with JavaScript☆81Jul 21, 2015Updated 10 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆15Feb 13, 2017Updated 9 years ago
- Repository to store unique seeds for DNS server fuzzing☆45Feb 18, 2016Updated 10 years ago
- A simple AWS Lambda layer to add dig support☆11Jun 17, 2019Updated 6 years ago
- BlindRef serves as the basis for an automated Blind-Based XXE Exploitation Framework☆26Mar 14, 2017Updated 8 years ago
- Carving tool based in Radare2 & Yara☆16Oct 30, 2018Updated 7 years ago
- Return a Promise when any element is scroll past☆10Aug 28, 2017Updated 8 years ago
- Convert the loot directory of ntlmrelayx into an enum4linux like output☆22Apr 12, 2020Updated 5 years ago
- A lightweight web application firewall module for nginx, which is already used in the production environment.☆14Mar 20, 2014Updated 11 years ago
- OhNo - The Evil Image Builder & Meta Manipulator☆11Jun 5, 2014Updated 11 years ago
- Experimental library for authors of protobuf code generators☆12Apr 3, 2018Updated 7 years ago
- Flash crossdomain policy security checker☆26Oct 3, 2015Updated 10 years ago
- Maltego Transform to put entities into MISP events☆28Jul 24, 2021Updated 4 years ago
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆44Dec 24, 2018Updated 7 years ago
- An automated XSS payload generator written in python.☆314Jun 2, 2016Updated 9 years ago
- Reverser - A Quick Reverse Connection Deployment Script☆12Jun 22, 2012Updated 13 years ago
- CLI implementation for Home Assistant☆17Updated this week
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago
- A Github organization reconnaissance tool.☆219May 22, 2023Updated 2 years ago
- The Swiss army knife of byte manipulation☆43Oct 9, 2016Updated 9 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- Various exploits for the HackSys Extreme Vulnerable Driver☆36Jan 8, 2017Updated 9 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆15Oct 10, 2016Updated 9 years ago
- Dart API docs☆19Jan 19, 2024Updated 2 years ago
- A framework for identifying and launching exploits against internal network hosts. Works via WebRTC IP enumeration combined with WebSocke…☆551Nov 6, 2015Updated 10 years ago
- Set of test cases that can be used to test custom implementations of the SecRules language (ModSecurity rules format).☆17Feb 25, 2025Updated last year
- ☆17Sep 9, 2022Updated 3 years ago