A CLI tool for querying passive DNS services
☆42Dec 15, 2023Updated 2 years ago
Alternatives and similar repositories for ukemi
Users that are interested in ukemi are comparing it to the libraries listed below
Sorting:
- Yet another dirbuster tool☆13Oct 16, 2023Updated 2 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- D4 core software (server and sample sensor client)☆43Dec 23, 2023Updated 2 years ago
- An npm package to defang and refang IoC☆12Sep 7, 2025Updated 5 months ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆79Jan 8, 2026Updated last month
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Aug 26, 2019Updated 6 years ago
- A phishing kit collector for scavengers☆220Jan 22, 2026Updated last month
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Nov 29, 2017Updated 8 years ago
- Tool to test for existence of CVE-2020-8218☆22Sep 5, 2020Updated 5 years ago
- Lightweight In-App Web Application Firewall for PHP☆42Aug 26, 2020Updated 5 years ago
- Ayashige provides a list of suspicious newly updated domains as a JSON feed☆38Jun 29, 2024Updated last year
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Feb 16, 2020Updated 6 years ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆126Jun 10, 2023Updated 2 years ago
- CVE-2020-1958 PoC☆22Apr 11, 2020Updated 5 years ago
- A library and cli tool to extract HWP files.☆30Dec 1, 2025Updated 3 months ago
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆102Jan 11, 2022Updated 4 years ago
- ZIP File Raider - Burp Extension for ZIP File Payload Testing☆72Aug 31, 2020Updated 5 years ago
- Mobile application and IoT network analysis automation tool.☆11May 9, 2019Updated 6 years ago
- CTF tasks created☆11Jan 12, 2023Updated 3 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- Burp Suite extension to help make Graphql request more readable☆33Dec 7, 2017Updated 8 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- sploit☆67Dec 21, 2019Updated 6 years ago
- CVE-2020-12828 PoC and Analysis.☆28Jun 30, 2020Updated 5 years ago
- A Netcat-style backdoor for pentesting and pentest exercises☆51Nov 19, 2020Updated 5 years ago
- AI-based, context-driven network device ranking☆300Feb 1, 2024Updated 2 years ago
- Automatic DLL comment link generation and explaination of the DLL Proxying techniques☆10Aug 19, 2021Updated 4 years ago
- Open Redirect Vulnerability Payload List☆10Feb 23, 2021Updated 5 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Stealthy data exfiltration via IPv6 covert channel☆103Jul 26, 2019Updated 6 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- super-Django-CC is a simle web interface for commoncrawl.org☆15Dec 8, 2022Updated 3 years ago
- Mindmaps for threat hunting - work in progress.☆152Mar 15, 2022Updated 3 years ago
- A Passive DNS backend and collector☆33Jul 16, 2022Updated 3 years ago