vavkamil / dkimsc4nView external linksLinks
Asynchronous wordlist based DKIM scanner
☆58Apr 27, 2021Updated 4 years ago
Alternatives and similar repositories for dkimsc4n
Users that are interested in dkimsc4n are comparing it to the libraries listed below
Sorting:
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Mar 3, 2017Updated 8 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Wordlists for Bug Bounty☆23Aug 18, 2019Updated 6 years ago
- Some useful test data or payloads☆24Oct 30, 2021Updated 4 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 3 years ago
- A Burp Suite Professional extension for decrypting/decoding various types of cookies.☆12Jun 12, 2019Updated 6 years ago
- ☆13Jul 30, 2021Updated 4 years ago
- ☆25Dec 4, 2019Updated 6 years ago
- This repository contains hit lists to use for web application content discovery.☆11May 31, 2017Updated 8 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Mar 11, 2021Updated 4 years ago
- ☆16Dec 20, 2021Updated 4 years ago
- scripts and configs from .conf2016 talk on Hunting the Known Unknowns PowerShell Edition☆15Oct 25, 2016Updated 9 years ago
- Create subdomains and files wordlists from your browser history☆13Jan 10, 2023Updated 3 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆18Jul 2, 2021Updated 4 years ago
- Burp extension to find and decode BigIP and Netscaler cookies☆15Jul 20, 2018Updated 7 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- X-Forwarded-For [403 forbidden] enumeration☆99May 3, 2024Updated last year
- A highly configurable Framework for easy automated web scanning☆381Jul 13, 2020Updated 5 years ago
- Workflow for pentesting web applications.☆21Feb 19, 2019Updated 6 years ago
- An android application which exploits sieve through android components.☆44Sep 17, 2017Updated 8 years ago
- Simple SOCKS5 client written in C++ (ONLY Windows implementation for now)☆14May 27, 2016Updated 9 years ago
- ☆18Aug 19, 2021Updated 4 years ago
- Burp Suite plugin created for using Collaborator tool during manual testing☆19Feb 4, 2022Updated 4 years ago
- Files for appsecwiki.com☆120Jul 7, 2020Updated 5 years ago
- Just lists of lists of lists !☆17Oct 13, 2025Updated 4 months ago
- Keye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will m…☆99Dec 30, 2019Updated 6 years ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Mar 9, 2022Updated 3 years ago
- Quick Start/Setup of CI/CD for Offensive/Defensive Purposes☆21Sep 4, 2021Updated 4 years ago
- Sample Vulnerable and Secure Code Snippets for Various Vulnerabilities☆23Jun 18, 2024Updated last year
- a hassle-free way to build srsLTE and srsUE☆19Sep 18, 2017Updated 8 years ago
- Jboss_JMXInvokerServlet_Deserialization_RCE☆21Sep 3, 2019Updated 6 years ago
- PowerShell script that decrypts password entries from a Passwordstate server.☆26Jan 4, 2023Updated 3 years ago
- ☆18Apr 3, 2023Updated 2 years ago
- Test the speed and reliability of a list of DNS servers☆22Dec 9, 2020Updated 5 years ago
- public dns server list for dmut project☆18Nov 30, 2023Updated 2 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆23Apr 28, 2019Updated 6 years ago
- Bass grabs you those "extra resolvers" you are missing out on when performing Active DNS enumeration. Add anywhere from 100-6k resolvers …☆147Apr 12, 2024Updated last year
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Nov 30, 2018Updated 7 years ago