micro-joan / DNSrecon-gui
DNSrecon tool with GUI for Kali Linux
☆55Updated last year
Related projects: ⓘ
- Pivot your way deeper into computer networks with SSH compromised machines.☆62Updated last year
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆46Updated 6 months ago
- Mass bruteforce authentication of network protocols☆42Updated 9 months ago
- Azure Service Subdomain Enumeration☆39Updated 2 weeks ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆50Updated last year
- Enumeration & fingerprint tool☆23Updated 6 months ago
- Collection of extra pentest tools for Kali Linux☆93Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated last year
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆15Updated last year
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆47Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆48Updated 6 months ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆31Updated 9 months ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆27Updated 2 years ago
- ☆53Updated this week
- SQLMutant is a comprehensive SQL injection testing tool that provides several features to test for SQL injection vulnerabilities in web a…☆64Updated last week
- Chrome extension tool for OSINT & Recon☆50Updated 6 months ago
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆29Updated last year
- Red Teaming tools and techniques☆45Updated last year
- Recon scripts for Red Team and Web blackbox auditing☆29Updated 7 months ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆28Updated 4 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆33Updated last week
- Modular framework to exploit UPS devices☆61Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆52Updated 2 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- Web Path Finder☆57Updated 9 months ago
- A Python based scanner uses shodan-internetdb to scan the IP.☆30Updated 2 years ago
- RedTeam - Red Team Tools☆38Updated last year
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Updated last year