The DNS Security Analysis Tool is a Python-based utility designed to conduct an in-depth security analysis of DNS configurations for multiple domains.
☆19Oct 18, 2024Updated last year
Alternatives and similar repositories for DSAT-DNSSecurityAnalysisTool
Users that are interested in DSAT-DNSSecurityAnalysisTool are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scripts for Pentesting☆14May 29, 2025Updated 10 months ago
- A script designed to test passwords against user accounts within an Active Directory environment, offering customizable Account Lockout T…☆17Jan 28, 2026Updated 2 months ago
- It's an AI Agent that analyzes PDFs (provided locally or via the web) using SenecaLLMs fine-tuned for cybersecurity. It identifies sensit…☆18Feb 12, 2025Updated last year
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ADB скрипт для Geely Monjaro (Geely Xingyue L).☆22Sep 4, 2023Updated 2 years ago
- ☆34Jun 13, 2023Updated 2 years ago
- QRFuzz, a fuzzing toolkit to test malicious QR Codes in mobile applications☆46May 16, 2024Updated last year
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 3 years ago
- Program to Inject a DLL into a process from memory.☆13Mar 16, 2024Updated 2 years ago
- Neo-reGeorg is a project that seeks to aggressively refactor reGeorg☆10Dec 26, 2022Updated 3 years ago
- Host Discovery Tool☆10Jan 17, 2022Updated 4 years ago
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.☆49Dec 18, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Run strongr-frida-server on boot with Magisk☆14Oct 12, 2024Updated last year
- ☆11Oct 3, 2021Updated 4 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup LeakBase☆68Aug 7, 2025Updated 7 months ago
- Simulate Windows EXE for Malware Research!☆19Sep 4, 2024Updated last year
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆12Feb 26, 2024Updated 2 years ago
- Just-In-time Active Directory solution☆32Sep 3, 2025Updated 6 months ago
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 2 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Check Sigma rules for easy-to-bypass whitelists to make them more robust (https://github.com/SigmaHQ/sigma)☆15Feb 1, 2021Updated 5 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- Collect XSS vulnerable parameters from entire domain.☆13Jul 29, 2022Updated 3 years ago
- SLSA Proposals☆11Jan 29, 2024Updated 2 years ago
- ☆28Jan 8, 2025Updated last year
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 5 months ago
- Remote boot your Linux, Windows or FreeBSD OS with PXE + iSCSI on another computer☆25Nov 4, 2024Updated last year
- Function decorators based on asyncio Lock, Semaphore and BoundedSemaphore☆13Dec 23, 2022Updated 3 years ago
- Reliably execute commands pre-shutdown delaying shutdown if necessary.☆14Sep 30, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Filesystem interaction via firebeam virtual machine execution☆42Mar 14, 2026Updated 2 weeks ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆17Oct 30, 2021Updated 4 years ago
- ☆24Nov 11, 2022Updated 3 years ago
- iOS traffic interception framework which route all device HTTP/HTTPS traffic through Burp Suite via a system-wide VPN tunnel☆41Feb 15, 2026Updated last month
- Just a quick and dirty tool I created to automate some of my standard recon/enumeration activities when doing CTFs☆13Mar 10, 2021Updated 5 years ago
- ☆12Jun 24, 2022Updated 3 years ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆75May 19, 2024Updated last year