Can I take over XYZ? Logo

Can I take over XYZ?

0
Free
Visit Website

A list of services and how to claim (sub)domains with dangling DNS records. This project aims to provide a comprehensive list of services and how to claim (sub)domains with dangling DNS records. This project is a community-driven effort to help security researchers and penetration testers to identify potential vulnerabilities in DNS records. This project is not affiliated with any organization or company. Please note that this project is for educational purposes only. Please do not use this information for malicious purposes. This project is licensed under the MIT License. Please report any issues or suggestions to the GitHub issues page. Thank you for your understanding. Best regards, EdOverflow

FEATURES

ALTERNATIVES

A PoC tool for utilizing GPT3.5 in developing an SMTP honeypot.

A tool for testing subdomain takeover possibilities at a mass scale.

A honeypot for the SSH Service

HoneyThing is a honeypot for Internet of TR-069 things, emulating vulnerabilities and supporting TR-069 protocol.

Docker-based honeypot setup with detailed installation and configuration instructions.

The DShield Raspberry Pi Sensor is a tool that turns a Raspberry Pi into a honeypot to collect and submit security logs to the DShield project for analysis.

Bluetooth Honeypot with monitoring capabilities

A project providing honeypots for embedded device vulnerabilities with support for AWS integration and JSON output.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved