0xcrypto / takeoverLinks
A script to test for subdomain takeovers from a list of domains
☆12Updated 2 years ago
Alternatives and similar repositories for takeover
Users that are interested in takeover are comparing it to the libraries listed below
Sorting:
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target s…☆19Updated 5 months ago
- ☆28Updated 5 years ago
- DNS hijacking via dead records automation tool☆53Updated 5 years ago
- H&E- Burp Highlighter and Extractor☆18Updated 2 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- Automated HTTP Request Repeating With Burp Suite☆40Updated 2 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆29Updated 2 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Updated 4 years ago
- ☆15Updated 2 years ago
- ☆30Updated 2 years ago
- Most common AWS S3 bucket names.☆28Updated 5 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated last year
- Monitor your target continuously for new subdomains!☆25Updated 2 years ago
- Find CVEs that don't have a Detectify modules.☆22Updated 2 years ago
- Repository of useful payloads and tips for pentesting/bug bounty.☆29Updated last year
- GetSimple CMS Custom JS Plugin Exploit RCE Chain☆11Updated 2 years ago
- CVE-2023-1671-POC, based on dnslog platform☆17Updated 2 years ago
- Scripts/tools to destroy things☆17Updated 4 years ago
- ☆16Updated last year
- ☆26Updated 3 years ago
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol☆36Updated 4 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆58Updated 5 years ago
- Subdomain Scan (knockpy) in Python3☆12Updated 5 years ago
- Automated compromise detection of the world's most popular packages☆17Updated 2 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆36Updated last week
- Security test tool for Blind XSS☆26Updated 5 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Updated last year
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Updated 4 years ago
- Subtron is a professional grade subdomain enumeration toolkit designed for security researchers, penetration testers, and bug bounty hunt…☆24Updated 3 months ago