praetorian-inc / dert
DNS Enumeration and Reconnaissance Tool
☆37Updated 9 years ago
Alternatives and similar repositories for dert:
Users that are interested in dert are comparing it to the libraries listed below
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- Flash crossdomain policy security checker☆25Updated 9 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 6 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 6 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated 8 months ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- Data exfiltration PoC scripts☆23Updated 9 years ago
- Normalizer for honeypot data.☆45Updated 9 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 8 years ago
- Collect hashes password hashes for cracking☆31Updated 11 years ago
- ☆27Updated 7 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Websocket based egress tester☆20Updated 8 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 7 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Crawl certificate information from censys☆8Updated 8 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆26Updated 10 years ago
- A collection of scripts made duing my personal research☆28Updated 6 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- Automated enumeration☆30Updated 3 years ago
- ☆46Updated 7 years ago
- ☆25Updated 8 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 8 years ago
- Some simple and useful tools☆15Updated 6 years ago
- REST/JSON interface to Burp Suite☆33Updated 4 years ago