truekonrads / danglingcnameView external linksLinks
A simple tool to find dangling CNAMEs
☆17Dec 7, 2023Updated 2 years ago
Alternatives and similar repositories for danglingcname
Users that are interested in danglingcname are comparing it to the libraries listed below
Sorting:
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆12Mar 22, 2021Updated 4 years ago
- Laz-y project compatible C# templates for shellcode injection.☆20May 1, 2022Updated 3 years ago
- Scripts to interact with Microsoft Graph APIs☆44Nov 7, 2024Updated last year
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆20Jul 7, 2021Updated 4 years ago
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆25Feb 8, 2022Updated 4 years ago
- Some of my custom "tools".☆28Feb 21, 2022Updated 3 years ago
- Conditional Access Reporting☆29Apr 4, 2025Updated 10 months ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆166May 28, 2025Updated 8 months ago
- ZAPISEC WAF-Copilot is an automated AI-powered security framework for web applications with a focus on highly configurable streamlined vu…☆21Oct 6, 2025Updated 4 months ago
- Dumping SAM / SECURITY / SYSTEM registry hives with a Beacon Object File☆214Oct 8, 2020Updated 5 years ago
- Azure AD Password Checker☆86Jan 17, 2025Updated last year
- ☆144Oct 31, 2023Updated 2 years ago
- ☆10Sep 27, 2023Updated 2 years ago
- Beacon Object Files for roasting Active Directory☆235Feb 21, 2022Updated 3 years ago
- 🐾Dogwalk PoC (using diagcab file to obtain RCE on windows)☆78Aug 11, 2022Updated 3 years ago
- A VS Code extension to preview XML nmap output☆43Feb 20, 2025Updated 11 months ago
- Website for The State of FOSS in India report.☆10Aug 20, 2021Updated 4 years ago
- Magnetic card spoofer☆12May 5, 2014Updated 11 years ago
- A package for setting up a metrics store in Metabase.☆14Dec 21, 2023Updated 2 years ago
- Documentation about the Tympan☆14Jun 14, 2022Updated 3 years ago
- This library is for simplified work with the sms-man.com API☆18Jan 18, 2022Updated 4 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆50May 3, 2022Updated 3 years ago
- A very simple lab to demo some Terraform, DSC, Inspec and Gitlab CI☆94Dec 8, 2022Updated 3 years ago
- everyday parsing, language tools, and more☆16Jul 3, 2025Updated 7 months ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- AIDA64DRIVER Elevation of Privilege Vulnerability☆16Oct 25, 2024Updated last year
- Trusty Dependency Risk Action☆10Feb 12, 2025Updated last year
- https://github.com/ManhNho/AWAE-OSWE☆11Aug 1, 2020Updated 5 years ago
- CLI version of NetworkMiner (https://www.netresec.com/?page=NetworkMiner)☆13Dec 1, 2025Updated 2 months ago
- macOS/OSX hash dump script taken from Empire framework☆13Oct 19, 2018Updated 7 years ago
- Windows privileges add to the complexity of Windows user permissions. Each additional user added to a group could lead to a domain compro…☆10Mar 2, 2018Updated 7 years ago
- ☆11Mar 26, 2018Updated 7 years ago
- ☆15Sep 17, 2022Updated 3 years ago
- How to build your own electrostatic headphones☆11Apr 15, 2018Updated 7 years ago
- Cloud hosted knowledge base and documentation for MUREX☆12Jun 29, 2025Updated 7 months ago
- ☆29Dec 11, 2025Updated 2 months ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Mar 26, 2021Updated 4 years ago
- nvidia-smi xml to json☆15May 29, 2024Updated last year