plinioseniore / cisco-umbrella-bypass
Bypass Cisco Umbrella DNS Proxy Firewall Restrictions
☆48Updated last year
Related projects ⓘ
Alternatives and complementary repositories for cisco-umbrella-bypass
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Find open databases - Powered by Binaryedge.io☆12Updated 4 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆18Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆31Updated 2 years ago
- ADDS (Active Directory Domain Services)☆25Updated last year
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆54Updated 2 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 2 years ago
- OWASP Foundation Web Respository☆35Updated 3 years ago
- VLAN ID Parser☆5Updated 6 months ago
- Modular framework to exploit UPS devices☆61Updated last year
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.☆18Updated 7 months ago
- Searching .evtx logs for remote connections☆23Updated last year
- Fast DNS history enumeration tool for network and OSINT investigations☆16Updated 3 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Updated 2 years ago
- Docker container to run Loki : Loki is a python based infrastructure pentesting tool focussing on layer 3 protocols.☆38Updated 4 months ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆30Updated 2 weeks ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- web application pentesting tools for docker☆17Updated 2 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆21Updated 2 years ago
- Custom pentesting tools☆24Updated 4 years ago
- Free Advance encryptor for Anon Cloud☆17Updated last year
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆14Updated 3 years ago
- The DNS Hunt will make your life easier, and of course faster.☆45Updated 4 years ago
- Extract Useful info from SSL VPN Directory Traversal Vulnerability (FG-IR-18-384)☆10Updated 3 years ago