Asynchronous wordlist based DKIM scanner
☆57Apr 27, 2021Updated 4 years ago
Alternatives and similar repositories for dkimsc4n
Users that are interested in dkimsc4n are comparing it to the libraries listed below
Sorting:
- Alpha version code of Recon UI☆15Feb 26, 2018Updated 8 years ago
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Mar 3, 2017Updated 9 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Username lists that I created.☆17Aug 9, 2021Updated 4 years ago
- Wordlists for Bug Bounty☆23Aug 18, 2019Updated 6 years ago
- Uninvited Guest - A file server for files over DNS TXT records☆22Sep 27, 2024Updated last year
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 6 years ago
- his list can be used by penetration testers when testing for SQL injection authentication bypass.A penetration tester can use it manually…☆19Jun 7, 2018Updated 7 years ago
- ☆12Jun 7, 2018Updated 7 years ago
- public dns server list for dmut project☆18Nov 30, 2023Updated 2 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 4 years ago
- Test the speed and reliability of a list of DNS servers☆22Dec 9, 2020Updated 5 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆23Apr 28, 2019Updated 6 years ago
- This repository contains hit lists to use for web application content discovery.☆11May 31, 2017Updated 8 years ago
- Files for appsecwiki.com☆120Jul 7, 2020Updated 5 years ago
- Fuzzing Payloads to Assist in Web Application Testing.☆166Jun 6, 2019Updated 6 years ago
- Jboss_JMXInvokerServlet_Deserialization_RCE☆21Sep 3, 2019Updated 6 years ago
- A permutation generation tool written in golang☆210Jul 15, 2019Updated 6 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆20Aug 23, 2019Updated 6 years ago
- Some useful test data or payloads☆24Oct 30, 2021Updated 4 years ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆48Jun 8, 2020Updated 5 years ago
- ☆15Mar 21, 2025Updated last year
- ☆13Jul 30, 2021Updated 4 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- Burp extension to decode NTLM SSP headers and extract domain/host information☆31Mar 11, 2021Updated 5 years ago
- ☆33Oct 29, 2020Updated 5 years ago
- Keye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will m…☆99Dec 30, 2019Updated 6 years ago
- A highly configurable Framework for easy automated web scanning☆382Jul 13, 2020Updated 5 years ago
- A Burp Suite Professional extension for decrypting/decoding various types of cookies.☆12Jun 12, 2019Updated 6 years ago
- WebLogic Insecure Deserialization - CVE-2019-2725 payload builder & exploit☆51Sep 26, 2019Updated 6 years ago
- My custom semgrep rules☆23Sep 13, 2020Updated 5 years ago
- A Python3 based single-file subdomain enumerator☆90Oct 5, 2019Updated 6 years ago
- commonspeak2 subdomains wordlist generated daily **DEPRECATED** The author(s) of commonspeak2 maintain an official repo with more lists. …☆40May 21, 2021Updated 4 years ago
- ☆44Aug 5, 2022Updated 3 years ago
- Vendor-Neutral Security Tool Automation Controller (over REST)☆28Jun 28, 2019Updated 6 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- ☆25Dec 4, 2019Updated 6 years ago