meliton / ISPiggy
Decentralized DNS fuzzer to mitigate ISP Snooping
☆12Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for ISPiggy
- ☆17Updated 4 years ago
- NSE-script for brute force open ports☆26Updated 9 years ago
- Hunt and Analyze Tor Onion Sites☆23Updated last year
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Python script for privilege escalation for Python☆9Updated 4 years ago
- Brute Force and Scan WinRm Service☆13Updated 4 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 7 years ago
- Automated Google dorking with custom search engines☆26Updated 4 years ago
- Search Nmap and Metasploit scanning scripts.☆54Updated 7 years ago
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 3 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 6 years ago
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- Docker Version of Aquatone☆13Updated 6 years ago
- Miscellaneous exploit scripts☆17Updated 2 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆40Updated 2 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Hostile Dropboxes Management☆25Updated 4 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 6 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆35Updated 4 years ago
- A multi-threaded class C network scanner. Loosely based on propecia.c by Bind.☆12Updated 10 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆35Updated 5 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆9Updated 6 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆19Updated last year
- Useful Windows and AD tools☆15Updated 2 years ago