A fast and comprehensive tool for organizational network scanning
☆134Apr 15, 2024Updated last year
Alternatives and similar repositories for domainim
Users that are interested in domainim are comparing it to the libraries listed below
Sorting:
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Feb 20, 2026Updated last week
- ☆15Jan 26, 2023Updated 3 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆50Feb 22, 2024Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆128Dec 23, 2025Updated 2 months ago
- ☆168Feb 29, 2024Updated 2 years ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆150Jun 5, 2025Updated 8 months ago
- ☆27Aug 18, 2023Updated 2 years ago
- ShellSweeping the evil.☆181Nov 25, 2024Updated last year
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆372Sep 29, 2025Updated 5 months ago
- C# project to Reflectively load .Net assemblies in memory☆19Jun 19, 2024Updated last year
- Find subdomains by searching public certificate records☆16Jun 11, 2024Updated last year
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆85Nov 22, 2023Updated 2 years ago
- Chrome extension tool for OSINT & Recon☆57Mar 12, 2024Updated last year
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆228Updated this week
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆42Oct 18, 2023Updated 2 years ago
- Things i do because i saw it on twitter on a weekend☆57Jul 20, 2025Updated 7 months ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 2 years ago
- ☆198Jan 18, 2023Updated 3 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆124Dec 13, 2025Updated 2 months ago
- A Slack bot phishing framework for Red Teaming exercises☆166Apr 27, 2024Updated last year
- ☆13Mar 1, 2024Updated 2 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- ☆36Apr 24, 2024Updated last year
- ☆26Jan 7, 2024Updated 2 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆59Apr 16, 2024Updated last year
- ☆65Mar 15, 2024Updated last year
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆191Updated this week
- Scan vulnerable drivers on Windows with loldrivers.io☆188Sep 11, 2023Updated 2 years ago
- smbcrawler is no-nonsense tool that takes credentials and a list of hosts and 'crawls' (or 'spiders') through those shares☆189Nov 19, 2025Updated 3 months ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Random IP Dialer for your subnet and SOCKS Proxy☆24Sep 1, 2025Updated 6 months ago
- Network Security Sniffer☆840Jan 2, 2026Updated 2 months ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Feb 20, 2026Updated last week
- ☆12Aug 10, 2019Updated 6 years ago
- Microsoft Graph API post-exploitation toolkit☆95Jul 13, 2024Updated last year
- KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).☆266Dec 15, 2025Updated 2 months ago
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆275Jun 16, 2024Updated last year
- SAP Penetration Testing: A Comprehensive Analysis of SAP Security Issues☆41Nov 23, 2023Updated 2 years ago