The DNS Security Analysis Tool is a Python-based utility designed to conduct an in-depth security analysis of DNS configurations for multiple domains.
☆19Oct 18, 2024Updated last year
Alternatives and similar repositories for DSAT-DNSSecurityAnalysisTool
Users that are interested in DSAT-DNSSecurityAnalysisTool are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scripts for Pentesting☆14May 29, 2025Updated 11 months ago
- A script designed to test passwords against user accounts within an Active Directory environment, offering customizable Account Lockout T…☆17Jan 28, 2026Updated 3 months ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Python tool to bruteforce openssl ciphers against a wordilst☆31Jul 20, 2018Updated 7 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Chat.JS - Vulnerable NodeJS Web-App to practice NoSQLi and Deserialization exploitation☆32Mar 21, 2021Updated 5 years ago
- A standalone collection of widely used technologies with default credentials enabled, which can be utilized for establishing an initial f…☆20Jun 1, 2024Updated last year
- ☆34Jun 13, 2023Updated 2 years ago
- QRFuzz, a fuzzing toolkit to test malicious QR Codes in mobile applications☆48May 16, 2024Updated last year
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 3 years ago
- Program to Inject a DLL into a process from memory.☆13Mar 16, 2024Updated 2 years ago
- Nmap GUI with SearchSploit and vulnerability script integrations, schedules, and reports☆12Dec 22, 2025Updated 4 months ago
- Host Discovery Tool☆10Jan 17, 2022Updated 4 years ago
- Deception implementation through analysis of BloodHound data☆58Mar 30, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.☆49Dec 18, 2024Updated last year
- ☆11Oct 3, 2021Updated 4 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- Simulate Windows EXE for Malware Research!☆20Sep 4, 2024Updated last year
- GORM clickhouse driver☆15Dec 7, 2023Updated 2 years ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆14Jun 12, 2024Updated last year
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆12Feb 26, 2024Updated 2 years ago
- Implementation and learning of algorithm and data structure concepts☆31Jan 28, 2026Updated 3 months ago
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Check Sigma rules for easy-to-bypass whitelists to make them more robust (https://github.com/SigmaHQ/sigma)☆16Feb 1, 2021Updated 5 years ago
- Remote boot your Linux, Windows or FreeBSD OS with PXE + iSCSI on another computer☆25Nov 4, 2024Updated last year
- Collect XSS vulnerable parameters from entire domain.☆13Jul 29, 2022Updated 3 years ago
- Some metasploit scripts to help to control busybox based embedded devices☆31Aug 13, 2015Updated 10 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 7 months ago
- Function decorators based on asyncio Lock, Semaphore and BoundedSemaphore☆13Dec 23, 2022Updated 3 years ago
- Reliably execute commands pre-shutdown delaying shutdown if necessary.☆14Sep 30, 2021Updated 4 years ago
- Filesystem interaction via firebeam virtual machine execution☆52Mar 26, 2026Updated last month
- ☆24Nov 11, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆17Oct 30, 2021Updated 4 years ago
- Just a quick and dirty tool I created to automate some of my standard recon/enumeration activities when doing CTFs☆13Mar 10, 2021Updated 5 years ago
- Swift wrapper for the Bitcoin Core RPC☆15Dec 27, 2021Updated 4 years ago
- iOS traffic interception framework which route all device HTTP/HTTPS traffic through Burp Suite via a system-wide VPN tunnel☆43Feb 15, 2026Updated 2 months ago
- Kubernetes Dashboard iOS App☆19Mar 5, 2024Updated 2 years ago
- ☆12Jun 24, 2022Updated 3 years ago
- A Hash Collision Attack is an attempt to find two input strings of a hash function that produce the same hash result. Because hash functi…☆15Dec 7, 2017Updated 8 years ago