mirror of
https://github.com/enaqx/awesome-pentest.git
synced 2024-12-22 21:59:29 -05:00
parent
8de8f60642
commit
11148aecc9
@ -125,7 +125,14 @@ A collection of awesome penetration testing resources
|
||||
* [netsniff-ng](https://github.com/netsniff-ng/netsniff-ng) - A Swiss army knife for for network sniffing
|
||||
* [Intercepter-NG](http://intercepter.nerf.ru/) - a multifunctional network toolkit
|
||||
* [SPARTA](http://sparta.secforce.com/) - Network Infrastructure Penetration Testing Tool
|
||||
* [DNSDumpster](https://dnsdumpster.com/) - Online DNS recond and search service
|
||||
* [dnschef](https://thesprawl.org/projects/dnschef/) - A highly configurable DNS proxy for pentesters
|
||||
* [DNSDumpster](https://dnsdumpster.com/) - Online DNS recon and search service
|
||||
* [dnsenum](https://github.com/fwaeytens/dnsenum/) - Perl script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results
|
||||
* [dnsmap](https://github.com/makefu/dnsmap/) - Passive DNS network mapper
|
||||
* [dnsrecon](https://github.com/darkoperator/dnsrecon/) - DNS Enumeration Script
|
||||
* [dnstracer](http://www.mavetju.org/unix/dnstracer.php) - Determines where a given DNS server gets its information from, and follows the chain of DNS servers
|
||||
* [passivedns-client](https://github.com/chrislee35/passivedns-client) - Provides a library and a query tool for querying several passive DNS providers
|
||||
* [passivedns](https://github.com/gamelinux/passivedns) - A network sniffer that logs all DNS server replies for use in a passive DNS setup
|
||||
* [Mass Scan](https://github.com/robertdavidgraham/masscan) - TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
|
||||
* [Zarp](https://github.com/hatRiot/zarp) - Zarp is a network attack tool centered around the exploitation of local networks
|
||||
* [mitmproxy](https://github.com/mitmproxy/mitmproxy) - An interactive SSL-capable intercepting HTTP proxy for penetration testers and software developers
|
||||
|
Loading…
Reference in New Issue
Block a user