Checks if out-of-bailiwick hostnames of a zone are resolvable
☆18Dec 19, 2022Updated 3 years ago
Alternatives and similar repositories for hostname-check
Users that are interested in hostname-check are comparing it to the libraries listed below
Sorting:
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Aug 1, 2022Updated 3 years ago
- Network detector for Winnti malware☆21Mar 6, 2018Updated 8 years ago
- Burp extension for quickly copying request/response data.☆31Feb 12, 2026Updated 3 weeks ago
- splunk alert script to create resilient tickets☆10Jun 8, 2016Updated 9 years ago
- MongoDB Login Brute Forcer☆11Jun 22, 2014Updated 11 years ago
- A simple, reliable and reasonably fast network capture analyzer.☆26Updated this week
- Google Chrome internals analysis using Volatility☆42Nov 17, 2022Updated 3 years ago
- A PowerShell module for creating and removing Loopback Network Adapters on Windows using Device Conslole (DevCon.exe)☆15Feb 26, 2021Updated 5 years ago
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 8 years ago
- OWASP Foundation Web Respository☆11Jan 14, 2026Updated last month
- EternalBlue/DoublePulsar python wrapper☆10Nov 22, 2017Updated 8 years ago
- vulnerability reporting tool powered by vulners.com and wpvulndb.com☆12Aug 31, 2022Updated 3 years ago
- GCNotify is an Outlook addin for quickly forwarding mail as attachment to a pre-defined e-mail address.☆12Jan 17, 2023Updated 3 years ago
- Automate scans using Qualys SSL Labs☆19Mar 10, 2020Updated 5 years ago
- PureBasic IDE Tool to view, edit and re-assemble the assembler file.☆11Jan 7, 2018Updated 8 years ago
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- Teensy code to brute force a keylogger's unlock code☆15Sep 5, 2016Updated 9 years ago
- ☆12Jun 2, 2021Updated 4 years ago
- SQL injection detection engine by tokenzing and syntax analysis, like SQLChop☆10May 8, 2017Updated 8 years ago
- 🐳 Login to Docker registries☆17Jan 22, 2026Updated last month
- A set of bash scripts for offensive security pentesting. (Machine with Kali reccomended)☆13Sep 30, 2016Updated 9 years ago
- Burp Extender plugin that generates a sitemap of a website using Wayback Machine☆12Jun 18, 2018Updated 7 years ago
- LLM Supported Attack Scenario Creator from Code Review☆14Oct 22, 2024Updated last year
- Makes working with OWL ontologies in Java easy by auto-generating classes that wrap OWL instances with a convenient API☆17Jul 20, 2010Updated 15 years ago
- BambuMan is a companion app for Spoolman. It allows you to easily import spools by reading the Bambu Lab NFC tag.☆25Updated this week
- Command line client for the Fugue API☆14Mar 7, 2023Updated 3 years ago
- CADGMM (PAKDD2020)☆11Jan 2, 2021Updated 5 years ago
- Entrada - A tool for DNS big data analytics☆50Aug 7, 2024Updated last year
- ☆11Apr 18, 2018Updated 7 years ago
- torcx is a boot-time addon manager for immutable systems☆17Dec 5, 2025Updated 3 months ago
- Backup, restore and delete emails from an IMAP server to local storage☆15Jan 4, 2025Updated last year
- Injecting failures into BGP.☆10Dec 6, 2015Updated 10 years ago
- Browse and search through nmap's NSE scripts.☆58Jun 8, 2017Updated 8 years ago
- OSINT Web Page Finder☆11May 20, 2020Updated 5 years ago
- This is a POC repository showing how a Kubernetes Admission Controller can be made irrelevant when verifying container image signatures☆12Dec 21, 2022Updated 3 years ago
- IPC library used by GnuPG. NOTE: Maintainers are not tracking this mirror. Do not make pull requests here, nor comment any commits, submi…☆13Feb 27, 2026Updated last week
- Ansible Galaxy Role to install and uninstall Cyberark AIM provider☆15Jan 17, 2023Updated 3 years ago
- ☆13Aug 10, 2023Updated 2 years ago
- ☆13Jun 1, 2021Updated 4 years ago