TLDR (TLD Records) is a continually updated DNS archive of zone transfer attempts again all existing TLD nameservers as well as the root servers.
☆519Sep 29, 2022Updated 3 years ago
Alternatives and similar repositories for TLDR
Users that are interested in TLDR are comparing it to the libraries listed below
Sorting:
- Top Level Domain data☆71Dec 8, 2019Updated 6 years ago
- Snapshot of North Korea's DNS data taken from zone transfers.☆1,744Sep 23, 2016Updated 9 years ago
- Summary and archives of leaked Russian TLD DNS data☆188Jun 20, 2017Updated 8 years ago
- Dynamic DNS Update Bruteforce Tool☆29Feb 8, 2017Updated 9 years ago
- Nameserver DNS poisoning attacks made easy☆526Feb 26, 2017Updated 9 years ago
- Summary and archives of leaked Vietnam TLD DNS data☆46Sep 4, 2017Updated 8 years ago
- Daily TLD health report generated using RIPE's DNSCheck against all existing TLDs.☆18Jan 25, 2017Updated 9 years ago
- A Tool for DNS Delegation Trust Graphing☆409May 22, 2023Updated 2 years ago
- a mass web screenshot tool for mapping web networks.☆24Apr 16, 2015Updated 10 years ago
- Cloudflare DNS Enumeration Tool for Pentesters☆524Aug 6, 2022Updated 3 years ago
- A framework for identifying and launching exploits against internal network hosts. Works via WebRTC IP enumeration combined with WebSocke…☆551Nov 6, 2015Updated 10 years ago
- A very simple bridge for performing Flash HTTP requests with JavaScript☆81Jul 21, 2015Updated 10 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Oct 24, 2016Updated 9 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆43Feb 6, 2019Updated 7 years ago
- A tool for enumerating expired domains in CNAME records☆60Jun 30, 2016Updated 9 years ago
- Pivotable Reverse WhoIs / PDNS Fusion with Registrant Tracking & Alerting plus API for automated queries (JSON/CSV/TXT)☆159Sep 20, 2021Updated 4 years ago
- The XSS Hunter service - a portable version of XSSHunter.com☆1,542Dec 7, 2022Updated 3 years ago
- An automated XSS payload generator written in python.☆314Jun 2, 2016Updated 9 years ago
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,606Apr 15, 2025Updated 10 months ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 11 years ago
- DNS zone transfer research☆59Nov 21, 2016Updated 9 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆278Feb 12, 2021Updated 5 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆292Oct 28, 2017Updated 8 years ago
- An automation framework for running multiple open sourced subdomain bruteforcing tools (in parallel) using your own wordlists via Docker …☆260Aug 22, 2021Updated 4 years ago
- docker based telnet honeypot☆80Feb 19, 2018Updated 8 years ago
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,113Feb 14, 2026Updated 3 weeks ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,227Nov 20, 2025Updated 3 months ago
- Powershell C2 Server and Implants☆575Nov 11, 2019Updated 6 years ago
- ip6.arpa scanner☆33Dec 19, 2016Updated 9 years ago
- A DNS connectback shell executed by strings in payloads.txt☆102Sep 19, 2023Updated 2 years ago
- A DNS meta-query spider that enumerates DNS records, and subdomains.☆3,503Jan 13, 2022Updated 4 years ago
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆183Jun 10, 2022Updated 3 years ago
- This repository contains all the material from the talk "Esoteric sub-domain enumeration techniques" given at Bugcrowd LevelUp 2017 virtu…☆628Feb 5, 2019Updated 7 years ago
- Open Source Telnet Honeypot☆106Mar 20, 2017Updated 8 years ago
- A collection of post-exploitation tools for network red teaming.☆138Dec 7, 2018Updated 7 years ago
- Collection of IOCs related to targeting of civil society☆189Nov 11, 2021Updated 4 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Sep 26, 2017Updated 8 years ago
- A project designed to parse public source code repositories and find various types of vulnerabilities.☆193Oct 6, 2017Updated 8 years ago
- Analyze the security of any domain by finding all the information possible. Made in python.☆1,861Dec 29, 2022Updated 3 years ago