PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.
☆248Jul 8, 2025Updated 10 months ago
Alternatives and similar repositories for PolarDNS
Users that are interested in PolarDNS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆463Mar 28, 2024Updated 2 years ago
- Lambda function that streamlines containment of an AWS account compromise☆345Dec 1, 2023Updated 2 years ago
- ⚡ Vigil ⚡ Detect prompt injections, jailbreaks, and other potentially risky Large Language Model (LLM) inputs☆479Jan 31, 2024Updated 2 years ago
- An offensive data enrichment pipeline☆958May 2, 2026Updated 2 weeks ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆43Jan 10, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆74Jun 21, 2024Updated last year
- Your Everyday Threat Intelligence☆1,982Updated this week
- The Internets #1 Subdomain Takeover Tool☆307Jun 4, 2025Updated 11 months ago
- k0smotron☆707May 13, 2026Updated last week
- ☆26Jun 2, 2022Updated 3 years ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆131Jan 28, 2025Updated last year
- DriveFS Sleuth is a Python tool that automates investigating Google Drive File Stream disk artifacts, the tool has been developed based o…☆88Dec 20, 2024Updated last year
- Digging Deeper....☆3,959May 15, 2026Updated last week
- Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-t…☆1,426Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Pen Test Report Generation and Assessment Collaboration☆594Updated this week
- A repository of code signing certificates known to have been leaked or stolen, then abused by threat actors☆403Apr 3, 2024Updated 2 years ago
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.☆1,024Mar 21, 2025Updated last year
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆439May 12, 2026Updated last week
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆266Nov 21, 2025Updated 6 months ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- Maltego Transforms for generating screenshots from Websites and URLs☆16Apr 24, 2023Updated 3 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆74Mar 19, 2025Updated last year
- Real-World DevOps Project From Start To Finish, by Packt Publishing☆14Dec 2, 2024Updated last year
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆20Jan 20, 2025Updated last year
- Helper scripts to automate the extraction of YARA rules from XProtectRemediators☆22Mar 5, 2024Updated 2 years ago
- Automation tool for Windows Deception Host Burn-In☆85Dec 4, 2024Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆29Apr 22, 2023Updated 3 years ago
- Tool to remotely dump secrets from the Windows registry☆529Feb 27, 2026Updated 2 months ago
- DEFCON 31 slide deck and video link☆68Jun 2, 2025Updated 11 months ago
- Simple tmux session management.☆16Dec 16, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- game of active directory☆7,818Mar 12, 2026Updated 2 months ago
- A collection of CVEs weaponized by ransomware operators☆140May 9, 2026Updated last week
- RansomLord is a proof-of-concept Anti-Ransomware exploitation tool that automates the creation of PE files, used to compromise ransomware…☆515Jun 20, 2025Updated 11 months ago
- The useful exploit finder☆826Jan 19, 2026Updated 4 months ago
- A meta-list of public references to threat actor profiles and APT group datasets.☆80Oct 2, 2025Updated 7 months ago
- CI/CD Security Analyzer☆738Feb 24, 2025Updated last year
- Winbindex bot to pull in binaries for specific releases☆50Sep 15, 2023Updated 2 years ago