A command-line whois - like client for the WHOIS and WHOIS History APIs by WhoisXML API Inc.
☆19Feb 9, 2022Updated 4 years ago
Alternatives and similar repositories for bestwhois
Users that are interested in bestwhois are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A script written in python3 to spread blind cross-site scripting payloads on HTTP requests headers☆10Oct 2, 2022Updated 3 years ago
- Repo to host a comprehensive list of all my Public Gists with a short description for each item and a link to the Gist pages in question.…☆15Apr 27, 2021Updated 4 years ago
- CLI tool written in Go to generate Canary Tokens from https://canarytokens.org☆13Aug 22, 2025Updated 7 months ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆13Jan 6, 2022Updated 4 years ago
- Python package dependency confusion vulnerability POC. Impact this vulnerability is Remote code execution (RCE)☆12Apr 29, 2025Updated 11 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A Maltego transforms collection for Twint☆30Jul 31, 2020Updated 5 years ago
- OSINT Intelligence for different areas ( useful for different type of investigations and learning etc)☆14May 20, 2020Updated 5 years ago
- A curated list of awesome infosec resources.☆32May 31, 2015Updated 10 years ago
- Install applications and development environment on a macOS or Linux machine.☆14Mar 22, 2026Updated last week
- Automation of VPC Traffic Mirror Sessions in AWS☆35Nov 15, 2025Updated 4 months ago
- Scanner to send specially crafted requests and catch callbacks of systems that are impacted by log4j log4shell vulnerability and to detec…☆12Feb 15, 2022Updated 4 years ago
- Solving CAPTCHA with Image Classification☆10Mar 13, 2025Updated last year
- ☆17Apr 19, 2023Updated 2 years ago
- A Python program to scrape secrets from GitHub through usage of a large repository of dorks.☆14Jan 28, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆14Sep 13, 2021Updated 4 years ago
- A tool to run nmap against each line in a script.☆17Jan 3, 2021Updated 5 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23May 1, 2022Updated 3 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆43Jan 20, 2026Updated 2 months ago
- A set of tools and procedures for automating NSM and NIDS deployments in AWS☆15Oct 16, 2020Updated 5 years ago
- CSV Manager for AWS Security Hub exports SecurityHub findings to a CSV file and allows you to mass-update SecurityHub findings by modifyi…☆17Jul 23, 2025Updated 8 months ago
- Scalable, Flexible, Extensible HomeLocationRegister (HLR)☆17Apr 1, 2018Updated 7 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- A browser extension to help avoid CORS issues for former2.com☆14Feb 26, 2026Updated last month
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- CLI to obtain JWT, SAML tokens, and AWS credentials using Auth0, OAuth and SAML☆15Dec 9, 2022Updated 3 years ago
- A CLI for identifying potential Personally Identifiable Information in datasets.☆14Apr 9, 2019Updated 6 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Sep 2, 2021Updated 4 years ago
- Configure and deploy AWS Security Hub.☆16Jul 28, 2023Updated 2 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated last month
- An HTTP proxy library for Go☆16Jun 22, 2022Updated 3 years ago
- Command line tool for analyzing .json files generated by bloodhound.py or sharphound for use in Bloodhound.☆20Jan 12, 2019Updated 7 years ago
- Use the Hacker Target IP Tools API for Reconnaissance in Maltego☆68Jan 23, 2021Updated 5 years ago
- ☆11May 13, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- ☆17Oct 26, 2021Updated 4 years ago
- THOR APT Scanner User Manual☆20Mar 9, 2026Updated 2 weeks ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆17Jun 23, 2021Updated 4 years ago
- ☆12Jan 1, 2021Updated 5 years ago
- ☆23Feb 20, 2023Updated 3 years ago
- Resources Links for the Research Based on Josh Prager and Nico Shyne's☆13Oct 21, 2024Updated last year