stealth / fernmelderLinks
async mass DNS resolver
☆85Updated last year
Alternatives and similar repositories for fernmelder
Users that are interested in fernmelder are comparing it to the libraries listed below
Sorting:
- Web Filter External Enumeration Tool (WebFEET)☆78Updated 11 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆94Updated 7 years ago
- Open Source - Common Findings DataBase (JSON & MD)☆67Updated 3 years ago
- Bash script to parse multiple Nmap (.gnmap) exports into various plain-text formats for easy analysis.☆66Updated 12 years ago
- Detects Cisco DTP modes for VLAN Hopping (passive detection)☆77Updated 11 years ago
- Password spraying script and helper for creating password lists☆34Updated 5 years ago
- API testing tool written with Python☆56Updated 8 years ago
- This is a bash script to bypass 802.1x NAC☆100Updated 2 years ago
- Script to automate, manage, and multithread Nikto scans.☆63Updated 5 years ago
- Tool to enumerate shares from Windows hosts.☆69Updated 3 years ago
- Plugins for the Serpico Project☆23Updated 7 years ago
- Helper scripts to assist penetration testing and exploit development☆35Updated last year
- Generate MS Word template-based reports with HP WebInspect / Burp Suite Pro input, own custom data and knowledge base.☆67Updated last year
- Sparty - MS Sharepoint and Frontpage Auditing Tool [Unofficial]☆97Updated 12 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆27Updated 6 years ago
- ☆98Updated 6 years ago
- AWS S3 Bucket/Object Finder☆25Updated 8 years ago
- ☆33Updated 3 years ago
- Nmap enumeration and script scan automation script☆38Updated 2 years ago
- CICSpwn is a tool to pentest a CICS Transaction servers on z/OS.☆86Updated 5 years ago
- Implementing Kerberoast attack fully in python☆72Updated 7 years ago
- lterm is a small script built to install a bash hook for full terminal logging.☆56Updated 9 years ago
- Burp Suite extension to perform Kerberos authentication☆106Updated last year
- ☆78Updated 8 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆129Updated 8 years ago
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆61Updated 3 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆71Updated 8 years ago
- Responsive Command and Control System☆102Updated 3 years ago
- ☆23Updated 9 years ago
- This is a simple parser for/decrypter for Impacket's esentutl.py utility. It assists with decrypting hashes and hash histories from ntds.…☆70Updated 9 years ago