n0kovo / DomainDoucheLinks
OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.
☆26Updated 2 years ago
Alternatives and similar repositories for DomainDouche
Users that are interested in DomainDouche are comparing it to the libraries listed below
Sorting:
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated 10 months ago
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- MacroExploit use in excel sheet☆20Updated last year
- ☆28Updated last year
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- FireProx written in Go☆19Updated last year
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago
- H&E- Burp Highlighter and Extractor☆18Updated 2 years ago
- your bestfried for finding LinkedIn Employees on github☆16Updated 2 years ago
- Beacon Object Files used for Cobalt Strike☆19Updated last year
- ☆22Updated last year
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- This repository presents a proof-of-concept of CVE-2023-22527☆12Updated last year
- ☆18Updated 6 months ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- A script used to query the dehashed API and filter for more useful results☆15Updated 3 years ago
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆37Updated 3 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 3 years ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- Searching .evtx logs for remote connections☆23Updated last year
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆23Updated 3 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Updated 2 years ago
- Automated compromise detection of the world's most popular packages☆15Updated last year
- ☆19Updated last year
- ☆25Updated 2 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Passworld is a fully customizable wordlist generator☆15Updated 8 months ago
- Manage attack surface data on Elasticsearch☆22Updated last year
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆26Updated last year