DomainDouche is a abusing securitytrails domain suggestion API to find potentially related domains by keyword and brute force.
usage: domaindouche.py [-h] [-n N] -c COOKIE -a USER_AGENT [-w NUM] [-o OUTFILE] keyword Abuses SecurityTrails API to find related domains by keyword. Go to https://securitytrails.com/dns-trails, solve any CAPTCHA you might encounter, copy the raw value of your Cookie and User-Agent headers and use them with the -c and -a arguments. positional arguments: keyword keyword to append brute force string to options: -h, --help show this help message and exit -n N, --num N number of characters to brute force (default: 2) -c COOKIE, --cookie COOKIE raw cookie string -a USER_AGENT, --useragent USER_AGENT user-agent string (must match the browser where the cookies are from) -w NUM, --workers NUM number of workers (default: 5) -o OUTFILE, --output OUTFILE output file path
ROADTools is a powerful framework designed for exploring and interacting with Microsoft Azure Active Directory…
Microsoft 365 Groups (also known as M365 Groups or Unified Groups) are at the heart…
SeamlessPass is a specialized tool designed to leverage on-premises Active Directory Kerberos tickets to obtain…
PPLBlade is a powerful Protected Process Dumper designed to capture memory from target processes, hide…
HikPwn: Comprehensive Guide to Scanning Hikvision Devices for Vulnerabilities If you’re searching for an efficient…
What Are Bash Comments? Comments in Bash scripts, are notes in your code that the…