DomainDouche is a abusing securitytrails domain suggestion API to find potentially related domains by keyword and brute force.
usage: domaindouche.py [-h] [-n N] -c COOKIE -a USER_AGENT [-w NUM] [-o OUTFILE] keyword Abuses SecurityTrails API to find related domains by keyword. Go to https://securitytrails.com/dns-trails, solve any CAPTCHA you might encounter, copy the raw value of your Cookie and User-Agent headers and use them with the -c and -a arguments. positional arguments: keyword keyword to append brute force string to options: -h, --help show this help message and exit -n N, --num N number of characters to brute force (default: 2) -c COOKIE, --cookie COOKIE raw cookie string -a USER_AGENT, --useragent USER_AGENT user-agent string (must match the browser where the cookies are from) -w NUM, --workers NUM number of workers (default: 5) -o OUTFILE, --output OUTFILE output file path
bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…
Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…
Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…
Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…