Lightweight WhoIs client
☆23Nov 21, 2025Updated 4 months ago
Alternatives and similar repositories for xep-whois
Users that are interested in xep-whois are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- first commit☆24Feb 16, 2026Updated last month
- masscan with exclusive excludes☆58Nov 8, 2023Updated 2 years ago
- ☆20Jan 2, 2026Updated 2 months ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- ☆16Dec 7, 2025Updated 3 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- CIB Analysis Data☆20May 10, 2020Updated 5 years ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆37Mar 4, 2025Updated last year
- A Mastodon bot that posts a list of new .gov registrations each day☆12Feb 13, 2023Updated 3 years ago
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆21Aug 25, 2024Updated last year
- A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845☆61Feb 14, 2025Updated last year
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- ☆22Jun 24, 2024Updated last year
- [QRS'22] TokenAuditor: Detecting Manipulation Risk in Token Smart Contract by Fuzzing☆16Aug 24, 2023Updated 2 years ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆32Mar 8, 2025Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Small tools to assist with using Large Language Models☆12Nov 7, 2023Updated 2 years ago
- A list of books suggested by the security community to aid intelligence analysts learn to think☆28Aug 7, 2023Updated 2 years ago
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Oct 29, 2024Updated last year
- Parses DNS responses in a secure, rigorous manner☆22Jul 24, 2020Updated 5 years ago
- 🔦 Uncovers a censored email's domain☆40Jun 15, 2023Updated 2 years ago
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- An AI-powered plugin for Caldera that orchestrates long-running LLM workflows to automatically create adversary emulation abilities and p…☆27Mar 18, 2026Updated last week
- Simple Python Modular Script to Broke Web Logins☆15Oct 7, 2022Updated 3 years ago
- CVE-2013-4786 Go exploitation tool☆40Nov 18, 2025Updated 4 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Metasploit Red Team Competition Modules☆13Apr 10, 2011Updated 14 years ago
- (Oblivious) DoH Server☆26Feb 21, 2022Updated 4 years ago
- MultiStep MCP That Returns CVE Information With EPSS Score☆13May 22, 2025Updated 10 months ago
- A JRuby implementation of the BurpExtender interface for PortSwigger Burp Suite. Not currently maintained -- see tduehr/buby☆28Apr 30, 2011Updated 14 years ago
- Material del Curso de Hacking Etico con Python☆12May 7, 2023Updated 2 years ago
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCP☆13Nov 16, 2017Updated 8 years ago
- Maturity Model Collaborative project☆15Feb 27, 2023Updated 3 years ago
- NVD API 2.0 client for CVE information☆13May 15, 2025Updated 10 months ago
- Check IP addresses against known cloud provider IP address ranges☆47Feb 7, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆26Nov 7, 2023Updated 2 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- Duplicate not owned Token from Running Process☆73Jul 21, 2023Updated 2 years ago
- ShellSweeping the evil.☆53Jun 18, 2024Updated last year
- commandline epub reader using python/curses☆29Aug 26, 2020Updated 5 years ago
- A simple command line tool which quickly audits the Disallow entries of a site's robots.txt.☆23Apr 5, 2023Updated 2 years ago
- Build scripts used to prepare self-contained packages of Arachni.☆13May 11, 2022Updated 3 years ago