A CLI tool for querying passive DNS services
☆43Dec 15, 2023Updated 2 years ago
Alternatives and similar repositories for ukemi
Users that are interested in ukemi are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Yet another dirbuster tool☆13Oct 16, 2023Updated 2 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- An npm package to defang and refang IoC☆13Apr 4, 2026Updated last week
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- D4 core software (server and sample sensor client)☆43Dec 23, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A phishing kit collector for scavengers☆222Jan 22, 2026Updated 2 months ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆79Jan 8, 2026Updated 3 months ago
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Aug 26, 2019Updated 6 years ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- Ayashige provides a list of suspicious newly updated domains as a JSON feed☆39Jun 29, 2024Updated last year
- sploit☆67Dec 21, 2019Updated 6 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Nov 29, 2017Updated 8 years ago
- A repo to hold some scripts pertaining WMI (Windows implementation of WBEM) forensics☆88Oct 6, 2017Updated 8 years ago
- Petaq - Purple Team Command & Control Server☆105Dec 8, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Feb 16, 2020Updated 6 years ago
- ☆37Apr 30, 2020Updated 5 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆126Jun 10, 2023Updated 2 years ago
- 基于asyncio(协程)的CVE-2020-0796 速度还是十分可观的,方便运维师傅们对内网做下快速检测。☆16Mar 18, 2020Updated 6 years ago
- Tool to test for existence of CVE-2020-8218☆22Sep 5, 2020Updated 5 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- LD_PRELOAD rootkit utils☆16Jul 3, 2015Updated 10 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Jun 19, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ZIP File Raider - Burp Extension for ZIP File Payload Testing☆72Aug 31, 2020Updated 5 years ago
- A collection of static files maintained by the Sublime team, primarily used for phishing defense.☆95Apr 3, 2026Updated last week
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- A Passive DNS backend and collector☆33Jul 16, 2022Updated 3 years ago
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆102Jan 11, 2022Updated 4 years ago
- A simple C implementation to decoded your shellcode and writes it directly to memory☆98Jul 10, 2020Updated 5 years ago
- A tool to run a command when the target of a symlink changes☆16Apr 28, 2016Updated 9 years ago
- Inject Encrypted Commands Into EMF Shapes for C2 In VBA / Office Malware☆39Jul 10, 2020Updated 5 years ago
- Automatic DLL comment link generation and explaination of the DLL Proxying techniques☆10Aug 19, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- CVE-2020-1958 PoC☆22Apr 11, 2020Updated 6 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 5 years ago
- fast, zero config web endpoint change monitor☆43Aug 4, 2020Updated 5 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆63Apr 4, 2026Updated last week
- Burp Suite extension to help make Graphql request more readable☆32Dec 7, 2017Updated 8 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- ☆20Aug 18, 2020Updated 5 years ago