Can I take over XYZ? Logo

Can I take over XYZ?

0
Free
Visit Website

A list of services and how to claim (sub)domains with dangling DNS records. This project aims to provide a comprehensive list of services and how to claim (sub)domains with dangling DNS records. This project is a community-driven effort to help security researchers and penetration testers to identify potential vulnerabilities in DNS records. This project is not affiliated with any organization or company. Please note that this project is for educational purposes only. Please do not use this information for malicious purposes. This project is licensed under the MIT License. Please report any issues or suggestions to the GitHub issues page. Thank you for your understanding. Best regards, EdOverflow

FEATURES

ALTERNATIVES

A low interaction honeypot for detecting CVE-2018-0101 vulnerability in Cisco ASA component.

A basic Flask-based Outlook Web App (OWA) honeypot for cybersecurity experimentation.

An automation framework for subdomain bruteforcing

A script for setting up a dionaea and kippo honeypot using Docker images.

An open source honeypot for NoSQL databases with support for Redis and additional features for detecting attackers and logging attack incidents.

A Perl honeypot program for monitoring hostile traffic and wasting hackers' time.

Kippo is a medium interaction SSH honeypot with fake filesystem and session logging capabilities.

A toolkit that transforms PHP applications into web-based high-interaction Honeypots for monitoring and analyzing attacks.