n0kovo / DomainDouche
OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.
☆25Updated last year
Alternatives and similar repositories for DomainDouche:
Users that are interested in DomainDouche are comparing it to the libraries listed below
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Updated 6 months ago
- A script used to query the dehashed API and filter for more useful results☆15Updated 3 years ago
- This repository presents a proof-of-concept of CVE-2023-22527☆13Updated last year
- ☆16Updated 10 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- ☆21Updated last year
- A Python script to find tenant id an region from a list of domain names.☆12Updated 2 weeks ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆20Updated 2 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 3 years ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- Searching .evtx logs for remote connections☆24Updated last year
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 10 months ago
- Simple Python script to sort nuclei scans by severity and URL☆29Updated last year
- Automated compromise detection of the world's most popular packages☆15Updated last year
- A basic proxylogon scanner☆27Updated 3 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆13Updated 2 years ago
- Exactly what it sounds like, which is something rad☆21Updated 2 years ago
- H&E- Burp Highlighter and Extractor☆18Updated last year
- FireProx written in Go☆19Updated 10 months ago
- MacroExploit use in excel sheet☆20Updated last year
- Poc script for ProxyShell exploit chain in Exchange Server☆18Updated 2 years ago
- Beacon Object Files used for Cobalt Strike☆17Updated last year
- ManageEngine ADManager Command Injection☆12Updated last year
- Tool for scanning domains for .git directories.☆12Updated last year
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆14Updated 2 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Updated last year
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆14Updated last year
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- ShootCutMe an .LNK file creator tool for redteamer☆13Updated 4 months ago