The DNS Security Analysis Tool is a Python-based utility designed to conduct an in-depth security analysis of DNS configurations for multiple domains.
☆19Oct 18, 2024Updated last year
Alternatives and similar repositories for DSAT-DNSSecurityAnalysisTool
Users that are interested in DSAT-DNSSecurityAnalysisTool are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Methodoloy for pentesting web applications.☆10Aug 18, 2022Updated 3 years ago
- A script designed to test passwords against user accounts within an Active Directory environment, offering customizable Account Lockout T…☆17Jan 28, 2026Updated 2 months ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- The IDOR IN works by systematically scanning a target web application and examining various endpoints, parameters, and data access points…☆25Jun 25, 2023Updated 2 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Azure Architecture Explained, published by Packt☆17Jan 24, 2025Updated last year
- ADB скрипт для Geely Monjaro (Geely Xingyue L).☆22Sep 4, 2023Updated 2 years ago
- A standalone collection of widely used technologies with default credentials enabled, which can be utilized for establishing an initial f…☆19Jun 1, 2024Updated last year
- ☆34Jun 13, 2023Updated 2 years ago
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 3 years ago
- Program to Inject a DLL into a process from memory.☆13Mar 16, 2024Updated 2 years ago
- Nmap GUI with SearchSploit and vulnerability script integrations, schedules, and reports☆12Dec 22, 2025Updated 3 months ago
- GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to ma…☆28Mar 8, 2023Updated 3 years ago
- Neo-reGeorg is a project that seeks to aggressively refactor reGeorg☆10Dec 26, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Host Discovery Tool☆10Jan 17, 2022Updated 4 years ago
- Deception implementation through analysis of BloodHound data☆58Mar 30, 2026Updated 2 weeks ago
- Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.☆49Dec 18, 2024Updated last year
- ☆11Oct 3, 2021Updated 4 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- Simulate Windows EXE for Malware Research!☆19Sep 4, 2024Updated last year
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆118Feb 18, 2025Updated last year
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup LeakBase☆68Aug 7, 2025Updated 8 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆12Feb 26, 2024Updated 2 years ago
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 3 months ago
- Just-In-time Active Directory solution☆33Sep 3, 2025Updated 7 months ago
- Check Sigma rules for easy-to-bypass whitelists to make them more robust (https://github.com/SigmaHQ/sigma)☆15Feb 1, 2021Updated 5 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- SLSA Proposals☆11Jan 29, 2024Updated 2 years ago
- Collect XSS vulnerable parameters from entire domain.☆13Jul 29, 2022Updated 3 years ago
- Function decorators based on asyncio Lock, Semaphore and BoundedSemaphore☆13Dec 23, 2022Updated 3 years ago
- Reliably execute commands pre-shutdown delaying shutdown if necessary.☆14Sep 30, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆28Jan 8, 2025Updated last year
- Filesystem interaction via firebeam virtual machine execution☆52Mar 26, 2026Updated 3 weeks ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆17Oct 30, 2021Updated 4 years ago
- Just a quick and dirty tool I created to automate some of my standard recon/enumeration activities when doing CTFs☆13Mar 10, 2021Updated 5 years ago
- ActiveMime File Format Documentation☆19Jun 28, 2021Updated 4 years ago
- iOS traffic interception framework which route all device HTTP/HTTPS traffic through Burp Suite via a system-wide VPN tunnel☆41Feb 15, 2026Updated 2 months ago
- Kubernetes Dashboard iOS App☆19Mar 5, 2024Updated 2 years ago