mandatoryprogrammer / TLDRLinks
TLDR (TLD Records) is a continually updated DNS archive of zone transfer attempts again all existing TLD nameservers as well as the root servers.
☆521Updated 3 years ago
Alternatives and similar repositories for TLDR
Users that are interested in TLDR are comparing it to the libraries listed below
Sorting:
- Snapshot of North Korea's DNS data taken from zone transfers.☆1,739Updated 9 years ago
- Simulates enough of a Telnet connection in order to log failed login attempts.☆244Updated 8 years ago
- Information Dump Monitor☆598Updated 7 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆239Updated 8 years ago
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆309Updated 4 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆457Updated 2 years ago
- Nameserver DNS poisoning attacks made easy☆525Updated 8 years ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆584Updated 8 years ago
- A Tool for DNS Delegation Trust Graphing☆406Updated 2 years ago
- All your IPs are belong to us.☆673Updated 7 years ago
- Sniffing browser history using HSTS☆935Updated 8 years ago
- A command line tool to detect shared passwords☆403Updated 9 years ago
- This repository has been combined with mac-tracker project and no longer receives updates.☆573Updated 4 months ago
- HonSSH is designed to log all SSH communications between a client and server.☆375Updated 3 years ago
- Spoilerwall introduces a brand new concept in the field of network hardening. Avoid being scanned by spoiling movies on all your ports!☆768Updated 5 years ago
- A list of all FTP servers in IPv4 that allow anonymous logins.☆657Updated 6 months ago
- Pixel-perfect LastPass phishing☆337Updated 9 years ago
- Proof of concept for CVE-2015-7547☆545Updated 9 years ago
- Take security by obscurity to the next level (this is a bad idea, don't really use this please)☆938Updated 3 years ago
- Blog-type notes about building Onion sites☆143Updated 8 years ago
- Vendor Response Matrix for KRACK WPA2 (Key Reinstallation Attack)☆753Updated 7 years ago
- Summary and archives of leaked Russian TLD DNS data☆186Updated 8 years ago
- Tools for downloading zone data and authentication credentials from ICANN's CZDS application.☆125Updated 6 years ago
- Don't Skype & Type! Keyboard acoustic eavesdropping tool.☆317Updated 6 years ago
- Chrome address spoofing vulnerability proof-of-concept for HTTPS. (Original by David Leo.)☆208Updated 10 years ago
- Visualize statistics from a Kippo SSH honeypot☆134Updated 2 years ago
- ☆384Updated 13 years ago
- Data flow in the Tor network☆538Updated 7 years ago
- Just-Metadata is a tool that gathers and analyzes metadata about IP addresses. It attempts to find relationships between systems within …☆628Updated last year
- ROCA: Infineon RSA key vulnerability☆490Updated 2 years ago