Hunt domain names using DNSDumpster, WHOIS, Reverse WHOIS, Shodan, Crimeflare
☆297Feb 7, 2019Updated 7 years ago
Alternatives and similar repositories for punter
Users that are interested in punter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆497Sep 21, 2021Updated 4 years ago
- online port scan scraper☆1,122Aug 7, 2023Updated 2 years ago
- Spiders given URLs for input fields.☆18Jul 8, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- IPv6 port scanner designed to be fast, aimed at Internet scanning and discovery☆179Mar 12, 2026Updated 3 weeks ago
- Automated HaveIbeenPwned lookups using theharvester results☆50Jan 9, 2018Updated 8 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆278Feb 12, 2021Updated 5 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Apr 27, 2023Updated 2 years ago
- Tools for auditing WAFS☆467Nov 24, 2020Updated 5 years ago
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆45Dec 24, 2018Updated 7 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆154Oct 20, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- Analyze the security of any domain by finding all the information possible. Made in python.☆1,862Dec 29, 2022Updated 3 years ago
- This is a tool for exploiting Ticketbleed (CVE-2016-9244) vulnerability.☆30Feb 20, 2017Updated 9 years ago
- 🕷 A lightning fast multithreaded network scanner framework with modules.☆322Nov 3, 2019Updated 6 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆226May 8, 2021Updated 4 years ago
- search for hosts info with shodan☆233Jun 14, 2021Updated 4 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- Scripts for running Responder.py in an Android (rooted) device.☆65Oct 25, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A tool to link a domain with registered organisation names and emails, to other domains.☆846May 16, 2024Updated last year
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Jan 11, 2026Updated 3 months ago
- Automate ARP poisoning, ssltrip, and ettercap.☆48Jan 1, 2017Updated 9 years ago
- Check dns servers for reverse resolving private ips☆41May 8, 2018Updated 7 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆536Jun 5, 2022Updated 3 years ago
- Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution☆396Oct 11, 2017Updated 8 years ago
- Automated Linux evil maid attack☆436Dec 22, 2015Updated 10 years ago
- A wrapper tool for shadowsocks to consistently bypass firewalls.☆81Dec 24, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- A Github organization reconnaissance tool.☆219May 22, 2023Updated 2 years ago
- Fierce.pl Domain Scanner☆302Jul 18, 2019Updated 6 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- DNS Enumeration with Asynchronicity☆45Oct 30, 2018Updated 7 years ago
- PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2☆1,218Feb 6, 2022Updated 4 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago