A passive scanning tool for finding expired domain vulnerabilities while you browse.
☆43Feb 6, 2019Updated 7 years ago
Alternatives and similar repositories for PERS
Users that are interested in PERS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Dynamic DNS Update Bruteforce Tool☆29Feb 8, 2017Updated 9 years ago
- Daily TLD health report generated using RIPE's DNSCheck against all existing TLDs.☆18Jan 25, 2017Updated 9 years ago
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- My curated list of best Stackoverflow questions that I have come across. Contributions are welcome!!☆13Jan 24, 2021Updated 5 years ago
- A very simple bridge for performing Flash HTTP requests with JavaScript☆81Jul 21, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆16Feb 13, 2017Updated 9 years ago
- Burp Enterprise Toolkit☆12Feb 25, 2022Updated 4 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 9 years ago
- Scans crossdomain.xml policies for expired domain names.☆26Aug 4, 2015Updated 10 years ago
- A tool for enumerating expired domains in CNAME records☆60Jun 30, 2016Updated 9 years ago
- Proof of Concept code for CVE-2015-0345 (APSB15-07)☆22Jun 12, 2015Updated 10 years ago
- Learn the basics of cryptography throughout history.☆21Jan 30, 2021Updated 5 years ago
- Nameserver DNS poisoning attacks made easy☆525Feb 26, 2017Updated 9 years ago
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆21Nov 15, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Various exploits for the HackSys Extreme Vulnerable Driver☆36Jan 8, 2017Updated 9 years ago
- Return a Promise when any element is scroll past☆10Aug 28, 2017Updated 8 years ago
- ☆16Mar 4, 2019Updated 7 years ago
- LibreSSL with a backdoor in RSA key generation☆17Jun 26, 2016Updated 9 years ago
- "><script>prompt(1)</script>''"><!--<svg>☆18Nov 20, 2015Updated 10 years ago
- Repository to store unique seeds for DNS server fuzzing☆45Feb 18, 2016Updated 10 years ago
- A lightweight web application firewall module for nginx, which is already used in the production environment.☆14Mar 20, 2014Updated 12 years ago
- Generate a hash by moving your mouse☆12Sep 8, 2016Updated 9 years ago
- A simple AWS Lambda layer to add dig support☆11Jun 17, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- API Tracker by Cysinfo Team☆22Oct 12, 2016Updated 9 years ago
- مستودع خاص بأكاديمية حسوب، يحوي الأمثلة المرفقة بدروس تطوير الوي ب☆13Sep 10, 2021Updated 4 years ago
- Reverser - A Quick Reverse Connection Deployment Script☆12Jun 22, 2012Updated 13 years ago
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆45Dec 24, 2018Updated 7 years ago
- Some setup scripts for security research tools.☆11May 10, 2015Updated 10 years ago
- A Github organization reconnaissance tool.☆219May 22, 2023Updated 2 years ago
- An automated XSS payload generator written in python.☆314Jun 2, 2016Updated 9 years ago
- A collection of container images used in CI across various opencontainers projects☆16Mar 22, 2023Updated 3 years ago
- Summary and archives of leaked Russian TLD DNS data☆188Jun 20, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A Web Server to hide stuff☆21Apr 29, 2022Updated 3 years ago
- Professional Wargaming LLM Toolbox☆22Jul 9, 2025Updated 9 months ago
- Convert the loot directory of ntlmrelayx into an enum4linux like output☆22Apr 12, 2020Updated 5 years ago
- Exploit insecure crossdomain.xml files.☆26Apr 25, 2017Updated 8 years ago
- The Swiss army knife of byte manipulation☆43Oct 9, 2016Updated 9 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆166May 19, 2023Updated 2 years ago
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago