aced
aiodnsbrute
aced | aiodnsbrute | |
---|---|---|
1 | 1 | |
140 | 624 | |
- | - | |
3.2 | 0.0 | |
4 months ago | 7 months ago | |
Python | Python | |
- | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
aced
aiodnsbrute
-
new to Semaphores and cannot get it to work, tasks going over the Semaphore value and 'NoneType' errors :/
For reference, this is my source material - https://github.com/blark/aiodnsbrute/blob/master/aiodnsbrute/cli.py I'm trying to basically rebuild this tool from each individual small part as a learning project. Would you say your point 3 applies to the way semaphores is implemented there?
What are some alternatives?
jfscan - JF⚡can - Super fast port scanning & service discovery using Masscan and Nmap. Scan large networks with Masscan and use Nmap's scripting abilities to discover information about services. Generate report.
Raccoon - A high performance offensive security tool for reconnaissance and vulnerability scanning
related-domains - Find related domains of a given domain.
dirsearch - Web path scanner
poastal - Poastal - the Email OSINT tool
ADenum - AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with kerberos.
msi-shenanigans - Proof of Concept code and samples presenting emerging threat of MSI installer files.
reconspider - 🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.
google-search - Returns results from Google search.
puncia - The Panthera(P.)uncia of Cybersecurity - Official CLI utility for Subdomain Center & Exploit Observer.
Lucifer - A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life