nethunteros / punterView external linksLinks
Hunt domain names using DNSDumpster, WHOIS, Reverse WHOIS, Shodan, Crimeflare
☆297Feb 7, 2019Updated 7 years ago
Alternatives and similar repositories for punter
Users that are interested in punter are comparing it to the libraries listed below
Sorting:
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- online port scan scraper☆1,120Aug 7, 2023Updated 2 years ago
- Automated HaveIbeenPwned lookups using theharvester results☆50Jan 9, 2018Updated 8 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆225May 8, 2021Updated 4 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- IPv6 port scanner designed to be fast, aimed at Internet scanning and discovery☆176Jan 29, 2026Updated 2 weeks ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Apr 27, 2023Updated 2 years ago
- Tools for auditing WAFS☆464Nov 24, 2020Updated 5 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆277Feb 12, 2021Updated 5 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆44Dec 24, 2018Updated 7 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆153Oct 20, 2018Updated 7 years ago
- 🕷 A lightning fast multithreaded network scanner framework with modules.☆322Nov 3, 2019Updated 6 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- DNS Enumeration with Asynchronicity☆45Oct 30, 2018Updated 7 years ago
- Automated Linux evil maid attack☆435Dec 22, 2015Updated 10 years ago
- A web front-end for password cracking and analytics☆621Dec 15, 2021Updated 4 years ago
- Inforfinder is a tool to collect information of any domains pointing at some server (ip, domain, range, file). Is able to detect all doma…☆68Sep 18, 2024Updated last year
- PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2☆1,209Feb 6, 2022Updated 4 years ago
- Next Generation Firewall Audit and Bypass Tool☆266Apr 24, 2017Updated 8 years ago
- Nameserver DNS poisoning attacks made easy☆525Feb 26, 2017Updated 8 years ago
- Analyze the security of any domain by finding all the information possible. Made in python.☆1,862Dec 29, 2022Updated 3 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆199Nov 19, 2017Updated 8 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Mar 14, 2017Updated 8 years ago
- Fierce.pl Domain Scanner☆300Jul 18, 2019Updated 6 years ago
- Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution☆394Oct 11, 2017Updated 8 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Apr 3, 2017Updated 8 years ago
- detectem - detect software and its version on websites.☆157Mar 25, 2021Updated 4 years ago
- A wrapper tool for shadowsocks to consistently bypass firewalls.☆81Dec 24, 2017Updated 8 years ago
- A Github organization reconnaissance tool.☆218May 22, 2023Updated 2 years ago
- Paskto - Passive Web Scanner☆150Dec 28, 2018Updated 7 years ago