0xcrypto / takeoverLinks
A script to test for subdomain takeovers from a list of domains
☆12Updated 2 years ago
Alternatives and similar repositories for takeover
Users that are interested in takeover are comparing it to the libraries listed below
Sorting:
- H&E- Burp Highlighter and Extractor☆18Updated 2 years ago
- Monitor your target continuously for new subdomains!☆25Updated 2 years ago
- Automated HTTP Request Repeating With Burp Suite☆40Updated 2 years ago
- Find CVEs that don't have a Detectify modules.☆22Updated 2 years ago
- Repository of useful payloads and tips for pentesting/bug bounty.☆29Updated last year
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆29Updated 2 years ago
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target s…☆19Updated 5 months ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- Personnel scripts,projects notes,hacks,random thoughts,mindmap etc....☆35Updated 11 months ago
- ☆14Updated 10 months ago
- Scripts/tools to destroy things☆17Updated 4 years ago
- ☆30Updated 2 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆57Updated 5 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 3 years ago
- DNS hijacking via dead records automation tool☆53Updated 5 years ago
- Most common AWS S3 bucket names.☆28Updated 5 years ago
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Updated last year
- ☆15Updated 2 years ago
- ☆25Updated last year
- Smart and efficient tool to automate open redirect detection at scale.☆10Updated 3 years ago
- Enumeration & fingerprint tool☆24Updated last year
- My experiments in weaponizing ONOS applications (https://github.com/opennetworkinglab/onos)☆20Updated last year
- Ffuf output browser☆40Updated 2 years ago
- CVE-2025-4123 - Grafana Tool☆30Updated 7 months ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆32Updated 2 years ago
- ☆15Updated 2 years ago
- Simple recon tool automates your recon process☆16Updated 2 years ago
- ☆16Updated last year
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆35Updated this week