The Unofficial Burp Extension for DNSDumpster.com
☆70Mar 8, 2018Updated 7 years ago
Alternatives and similar repositories for bumpster
Users that are interested in bumpster are comparing it to the libraries listed below
Sorting:
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Apr 12, 2017Updated 8 years ago
- VBA Reversed TCP Meterpreter Stager☆65Apr 23, 2018Updated 7 years ago
- ☆98Mar 16, 2016Updated 9 years ago
- Respounder detects presence of responder in the network.☆322Jun 15, 2019Updated 6 years ago
- A WebDAV PROPFIND C2 tool☆119Aug 27, 2019Updated 6 years ago
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 7 years ago
- Testing/collecting some container breakouts☆94Jul 22, 2019Updated 6 years ago
- A ton of helpful tools☆39Oct 8, 2021Updated 4 years ago
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- Powershell Empire Persistence finder☆119Jan 30, 2017Updated 9 years ago
- AV Bypass☆29Jan 12, 2018Updated 8 years ago
- This project is just a dumping ground for random scripts I've developed.☆139Aug 14, 2024Updated last year
- Use your Shodan API Key to dump all the contents of exposed memcached servers.☆142Mar 12, 2018Updated 7 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- Ransack Post Exploitation Tool☆16May 3, 2016Updated 9 years ago
- Leverage certificate transparency live feed to monitor for newly issued subdomain certificates (last 90 days, configurable), for domains …☆224Dec 7, 2022Updated 3 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- AWS Extender (Cloud Storage Tester) is a Burp plugin to assess permissions of cloud storage containers on AWS, Google Cloud and Azure.☆256Feb 23, 2022Updated 4 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 10 years ago
- Fetching data from system☆11Jun 18, 2017Updated 8 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- POC for .NET mssql client for accessing database data through beacon☆64Sep 12, 2023Updated 2 years ago
- A cobaltstrike script that integrates DDEAuto Attacks☆63Oct 17, 2017Updated 8 years ago
- Comprehensive Pivoting Framework☆20Sep 20, 2016Updated 9 years ago
- C# implementation of Shellcode delivery techniques using PInvoke and DInvoke variations for API calling.☆37Dec 20, 2021Updated 4 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79May 18, 2017Updated 8 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134May 27, 2019Updated 6 years ago
- some pocs for antivirus evasion☆129Aug 28, 2023Updated 2 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Aug 10, 2013Updated 12 years ago
- Web of trust grapher☆40Feb 25, 2026Updated last week
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆183Jun 10, 2022Updated 3 years ago
- Efficient clustering of MASSCAN results☆12Dec 26, 2016Updated 9 years ago