stamparm / dnslogLinks
Minimalistic DNS logging tool
☆44Updated 3 years ago
Alternatives and similar repositories for dnslog
Users that are interested in dnslog are comparing it to the libraries listed below
Sorting:
- Search the ExploitDB with a little more control☆21Updated 8 years ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 7 years ago
- Search Nmap and Metasploit scanning scripts.☆55Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 7 years ago
- VNC pentest tool with bruteforce and ducky script execution features☆23Updated 7 years ago
- SWF Vulnerability & Information Scanner☆19Updated 6 years ago
- Inforfinder is a tool to collect information of any domains pointing at some server (ip, domain, range, file). Is able to detect all doma…☆68Updated 10 months ago
- Openssh backdoor found with a ssh honeypot☆28Updated 9 years ago
- simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in /tmp/eximrce.☆13Updated 6 years ago
- Python implementation of RSA reverse shell.☆11Updated 8 years ago
- PoC for CVE-2020-11651☆6Updated 5 years ago
- ☆61Updated 2 years ago
- Dockerized version of Sn1per (https://github.com/1N3/Sn1per)☆60Updated 7 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Updated 5 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Updated 5 years ago
- phpldapadmin remote exploit and vulnerable container !☆13Updated 6 years ago
- Deploy payloads to *Nix systems en masse☆108Updated 5 years ago
- ☆46Updated 7 years ago
- Multi-Purpose DNS Server☆144Updated last month
- Stækka Metasploit - Extenting Metasploit☆54Updated 8 years ago
- PoC about CVE-2019-0708 (RDP; Windows 7, Windows Server 2003, Windows Server 2008)☆39Updated 6 years ago
- This is a concept poc of command and control server implemented over blockchain☆52Updated 5 years ago
- Repo for proof of concept exploits and tools.☆56Updated 4 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Updated 4 years ago
- Simulates a logged in user.☆16Updated last year
- Interactive Post Exploitation Tool☆37Updated 5 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- A simple scanner to find and brute force tomcat manager logins☆28Updated 5 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆64Updated 6 years ago