root4031 / domains-to-ip-resolversLinks
The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains which are alive and then resolve them into IPs. Finally will run an Advanced level NMAP NSE scan on them.
☆15Updated 3 years ago
Alternatives and similar repositories for domains-to-ip-resolvers
Users that are interested in domains-to-ip-resolvers are comparing it to the libraries listed below
Sorting:
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.☆10Updated 2 years ago
- A small and efficient tool to find open redirect vulnerabilities.☆17Updated 4 years ago
- A small to find Host Header Injection vulnerabilities in a websites☆11Updated 3 years ago
- This tool will help in generating reverse shells easily for all types of OS.☆19Updated 2 years ago
- Python Backdoor Obfusctor, Encrypter and Encoder☆17Updated 7 years ago
- Auto Web Vulnerability Scanning Framework☆10Updated 9 years ago
- ☆20Updated 12 years ago
- A small and an efficient tool to find SQL injection vulnerability in a websites.☆27Updated 3 years ago
- Rockyou for web fuzzing☆15Updated 3 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 6 years ago
- Repository of tools used in my blog☆51Updated last year
- Fully FUD keylogger that can bypass windows 11 & windows 10 defender protection and all kinds of Antivirus protections also.☆19Updated 4 years ago
- An automated e-mail OSINT tool☆23Updated 3 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆13Updated 4 years ago
- Collect XSS vulnerable parameters from entire domain.☆13Updated 3 years ago
- Lab Website For Practicing Different Types of SQL Injection Vulnerabilities☆21Updated 2 years ago
- crawl a website for links and expose all the vulnerable parameters.☆13Updated 3 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Updated 3 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Updated 4 years ago
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3☆11Updated 4 years ago
- A small tool to find admin panel of the website☆19Updated 3 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆28Updated last month
- Red Teaming Tactics and Techniques☆13Updated 3 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆22Updated 6 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Updated 4 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 4 years ago