A tool to perform DNS reconnaissance on target networks. Among the DNS information got from include subdomains, mx records, web application firewall detection and more fingerprinting and lookups
☆366Sep 15, 2024Updated last year
Alternatives and similar repositories for dnsdumpster
Users that are interested in dnsdumpster are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆60Aug 11, 2023Updated 2 years ago
- Fast subdomains enumeration tool for penetration testers☆10,864Aug 2, 2024Updated last year
- Subdomain and target enumeration tool built for offensive security testing☆940Jun 19, 2024Updated last year
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- Pentesting Apache Tomcat 101☆14Apr 4, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆16Dec 7, 2025Updated 3 months ago
- Open Redirection Analyzer☆810Mar 5, 2023Updated 3 years ago
- ☆1,259Dec 17, 2024Updated last year
- dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers.☆2,691Mar 23, 2026Updated last week
- Scanner and attack suite for hosts that forward unauthenticated packets via IPIP and GRE protocols. (CVE-2020-10136 CVE-2024-7595)☆11Jan 22, 2025Updated last year
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 3 years ago
- Searchsploit alternative. It differs in that it uses searchengines, can run unattended in the background, plays well with nmap and is abl…☆17Jul 9, 2020Updated 5 years ago
- This exploit allows to connect to the remote RemoteMouse 3.008 service to virtually press arbitrary keys and execute code on the machine.☆66Feb 11, 2025Updated last year
- ☆13Nov 17, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ⚡ Perform subdomain enumeration using the certificate transparency logs from Censys.☆838May 1, 2025Updated 10 months ago
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆17,147Dec 15, 2024Updated last year
- This is a simple C++ program that will copy clipboard data and upload it to a webserver of your choice!☆18Jan 16, 2024Updated 2 years ago
- Fast passive subdomain enumeration tool.☆13,323Updated this week
- Python TCP server for terminal rickrolls☆13Nov 23, 2021Updated 4 years ago
- Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hu…☆2,353Jun 27, 2024Updated last year
- In-depth attack surface mapping and asset discovery☆14,320Mar 21, 2026Updated last week
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- ☆31Mar 20, 2026Updated last week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,664Jan 5, 2026Updated 2 months ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,371Mar 20, 2026Updated last week
- AS numbers to organization names☆17Mar 15, 2026Updated 2 weeks ago
- A formula to calculate bounty amounts.☆15Dec 2, 2017Updated 8 years ago
- Inexpensive, reliable, dynamic DNS over IRC☆16Jun 29, 2021Updated 4 years ago
- E-mails, subdomains and names Harvester - OSINT☆15,912Updated this week
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Nov 12, 2021Updated 4 years ago
- Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.☆4,860Mar 20, 2026Updated last week
- A powerful tool to scan CRLF vulnerability written in Python☆15Oct 31, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- custom nuclei templates☆14Sep 27, 2022Updated 3 years ago
- IntelOwl: manage your Threat Intelligence at scale☆4,517Updated this week
- A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for att…☆5,837Updated this week
- POC for CVE-2023-24488☆14Jul 4, 2023Updated 2 years ago
- CTF WriteUps by team TWC☆16Jun 3, 2025Updated 9 months ago
- My bug bounty notes☆35Apr 10, 2021Updated 4 years ago
- Cyber stalker is a web application based tool to catch fake account users online☆19May 6, 2023Updated 2 years ago