☆29Jan 19, 2023Updated 3 years ago
Alternatives and similar repositories for DNS-Exfiltrate
Users that are interested in DNS-Exfiltrate are comparing it to the libraries listed below
Sorting:
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- This is a gem that provides the ability to create a workspace, import scan data from nexpose, and perform a webscan, a web audit, and per…☆10Dec 13, 2017Updated 8 years ago
- async parser for JET☆25Nov 14, 2025Updated 3 months ago
- Script for applied security baseline controls in RedHat/CentOS.☆12Jun 30, 2025Updated 8 months ago
- F5 Service Password Decryption☆29Jul 31, 2025Updated 7 months ago
- Collection of red machine learning projects☆41Aug 16, 2021Updated 4 years ago
- SANS Blue Team Pages☆13Apr 8, 2017Updated 8 years ago
- misp-guard is a mitmproxy addon that inspects and blocks outgoing events to external MISP instances via sync mechanisms (pull/push) based…☆20Jan 9, 2026Updated 2 months ago
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps org…☆21May 1, 2023Updated 2 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- A simple script to read the contents of a zip/tar/folder and extract metadata☆21Oct 6, 2025Updated 5 months ago
- Central repo for talks and presentations☆47Jul 23, 2024Updated last year
- A repository for maintaining a list of the top domains based on multiple lists☆23May 1, 2022Updated 3 years ago
- Dump of all my hash-cracking related stuffs.☆23May 16, 2019Updated 6 years ago
- ☆25Jun 15, 2025Updated 8 months ago
- Hunt for SQLite files used by various applications☆30Mar 1, 2026Updated last week
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Mar 9, 2022Updated 4 years ago
- ☆56Jun 12, 2021Updated 4 years ago
- A tiny tool built to help AD Admins tame the Protected Users group.☆140Sep 8, 2025Updated 6 months ago
- D/Invoke port of UrbanBishop☆30Dec 13, 2020Updated 5 years ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Sep 12, 2023Updated 2 years ago
- POC tool to abuse windows server failover clusters☆55Aug 7, 2025Updated 7 months ago
- ☆29May 16, 2023Updated 2 years ago
- S3 bucket enumerator☆30Apr 7, 2019Updated 6 years ago
- This is a set of tools for doing forensics analysis on Microsoft ESE databases.☆130Jan 31, 2022Updated 4 years ago
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆32May 11, 2024Updated last year
- A tool to modify timestamps in a packet capture to a user selected date☆31Aug 11, 2021Updated 4 years ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆93Jul 22, 2025Updated 7 months ago
- Python script to walk a folder or a zip file for SQLite Databases☆37Sep 20, 2023Updated 2 years ago
- A stand-alone implementation of Hashcat's rule engine☆35Sep 16, 2016Updated 9 years ago
- Proofpoint - Emerging Threats - Threat Research tools + publicly shared intel and documentation☆82Jan 28, 2026Updated last month
- ☆14Dec 11, 2025Updated 2 months ago
- CVE-2021-4034 POC exploit☆36Jan 28, 2022Updated 4 years ago
- DOS Program Development☆13Nov 9, 2022Updated 3 years ago
- Digital Artefact Extraction Tool for Discord Application☆12Apr 13, 2023Updated 2 years ago
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.☆47Sep 18, 2025Updated 5 months ago
- A python based script to update DNS entries in ADIDNS☆43Apr 12, 2024Updated last year