Unicode characters that will translate a single character to multiple characters in domain names or TLD's
☆50Nov 23, 2024Updated last year
Alternatives and similar repositories for shortboost
Users that are interested in shortboost are comparing it to the libraries listed below
Sorting:
- AssetViz simplifies the visualization of subdomains from input files, presenting them as a coherent mind map. Ideal for penetration test…☆37Feb 15, 2026Updated 2 weeks ago
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆37Feb 26, 2024Updated 2 years ago
- Attacking indiscriminately every header, cookie, GET and POST parameter with blind fury.☆13Sep 25, 2025Updated 5 months ago
- whoareyou is a tool to find the underlying technology/software used in a list of websites passed through stdin (using Wappalyzer dataset)☆32Jun 15, 2020Updated 5 years ago
- Deobfuscation of XorStringsNet☆14Nov 5, 2024Updated last year
- ☆14Mar 19, 2024Updated last year
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated 11 months ago
- Excel Add In Payload Generator☆14Oct 9, 2023Updated 2 years ago
- Little java tool to decrypt passwords from Openfire embedded-db☆16Nov 14, 2015Updated 10 years ago
- ☆63Mar 1, 2023Updated 3 years ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- A simple utility to fetch freshly updated DNS resolvers☆19Feb 17, 2024Updated 2 years ago
- Sample code for exfiltrating data through an XSS vulnerability. XSS Payload retrieves sensitive data in victim's browser, then breaks it …☆20May 11, 2021Updated 4 years ago
- Bloodhound agent for Mythic☆23Apr 19, 2025Updated 10 months ago
- ☆22Jun 9, 2025Updated 8 months ago
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆89Jun 13, 2024Updated last year
- Top hashpwn rules☆20Dec 12, 2025Updated 2 months ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and…☆20Aug 7, 2024Updated last year
- A Gruntified version of Reverie, a versatile HTML5 responsive WordPress framework based on ZURB's Foundation.☆45Jul 14, 2015Updated 10 years ago
- #1 DISCORD AIO☆41Mar 10, 2024Updated last year
- MailSecOps is an email and mail gateway security testing tool. With this script, you can perform mail spoofing, relay tests and security …☆56Nov 20, 2024Updated last year
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 2 months ago
- Bypasses renowned CDNs like Cloudflare, Akamai, Fastly, CloudFront, and Incapsula, exposing the actual IP addresses behind websites.☆26May 22, 2023Updated 2 years ago
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆21Aug 25, 2024Updated last year
- A tool to verify and create PE Checksums for Portable Executable (PE) files.☆56Jun 14, 2023Updated 2 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- Apache OFBIZ Path traversal leading to RCE POC[CVE-2024-32113 & CVE-2024-36104]☆27Jun 3, 2024Updated last year
- This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCo…