plinioseniore / cisco-umbrella-bypass
Bypass Cisco Umbrella DNS Proxy Firewall Restrictions
☆50Updated last year
Alternatives and similar repositories for cisco-umbrella-bypass:
Users that are interested in cisco-umbrella-bypass are comparing it to the libraries listed below
- Central IoC scanner based on Loki☆20Updated 3 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆21Updated 2 years ago
- A collection of tools for managing and automating vulnerability management.☆13Updated 2 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆32Updated 2 years ago
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- DNSrecon tool with GUI for Kali Linux☆56Updated 2 years ago
- A PowerShell script for helping to find vulnerable settings in AD Group Policy.☆14Updated 6 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆23Updated 7 months ago
- Zeroday Microsoft Exchange Server checker (Virtual Patching checker)☆71Updated 2 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 8 years ago
- ADDS (Active Directory Domain Services)☆26Updated last year
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- Bash script for CTF automating basic enumeration☆45Updated 3 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Extract Useful info from SSL VPN Directory Traversal Vulnerability (FG-IR-18-384)☆10Updated 4 years ago
- Free Advance encryptor for Anon Cloud☆17Updated 2 years ago
- OWASP Foundation Web Respository☆35Updated 3 years ago
- web application pentesting tools for docker☆17Updated 2 years ago
- Custom pentesting tools☆25Updated 4 years ago
- ☆27Updated last year
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- Lite version of my Gatekeeper backdoor for public use.☆53Updated 3 years ago
- An exotic service bruteforce tool.☆12Updated 2 years ago
- Searching .evtx logs for remote connections☆23Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Updated 3 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 3 years ago