phishai / idn_generatorLinks
Utility to generate similar IDN domain names
☆48Updated 7 years ago
Alternatives and similar repositories for idn_generator
Users that are interested in idn_generator are comparing it to the libraries listed below
Sorting:
- Nmap Script to scan for Winnti infections☆71Updated 7 years ago
- ☆61Updated 7 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- A finder of domain typos showing country of IP address☆167Updated 2 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- A tool to catch spoofed NBNS responses.☆51Updated 7 years ago
- An extensible honeypot framework☆96Updated 3 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such …☆67Updated 7 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆55Updated last year
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 8 years ago
- SMTP server / sinkhole for collecting spam☆45Updated 7 years ago
- penetration testing scripts☆136Updated 6 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Updated 7 years ago
- Rogue AP killer☆92Updated 7 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆109Updated 7 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆97Updated 8 years ago
- Stop searching for sample hashes on 10 different sites.☆66Updated 7 years ago
- A testing framework for mail security and filtering solutions.☆245Updated 2 years ago
- Creates dictionaries based on Wikipedia titles☆62Updated 6 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Updated 9 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆127Updated 7 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 2 years ago
- A bunch of scripts I use to work with urlscan.io☆35Updated 6 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated last year
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Updated 6 years ago
- Scan for and exploit Consul agents☆40Updated 6 years ago
- Enterprise WPA Wireless Tool Suite☆86Updated 3 years ago
- Slides from various talks that I've given over the years☆118Updated 2 years ago