0xcrypto / takeover
A script to test for subdomain takeovers from a list of domains
☆12Updated last year
Related projects ⓘ
Alternatives and complementary repositories for takeover
- CVE-2023-1671-POC, based on dnslog platform☆18Updated last year
- H&E- Burp Highlighter and Extractor☆18Updated last year
- Scripts/tools to destroy things☆17Updated 3 years ago
- Saves pages to Wayback machine☆13Updated 2 years ago
- ☆15Updated last year
- HTTP requests of FrontPage expolit☆24Updated 10 years ago
- Python TCP server for terminal rickrolls☆11Updated 2 years ago
- Small python or powershell script to look for potential subdomain takeover vulnerabilities via vulnerable Alias.☆8Updated 3 years ago
- Quick tool to create custom wordlists like how fuzzers work☆11Updated last year
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- BurpSuite Extension for performing scan via CLI.☆10Updated 6 years ago
- A tools for JavaScript Recon☆21Updated 4 years ago
- XSS payloads for exploiting Markdown syntax☆9Updated 3 years ago
- Simple recon tool automates your recon process☆16Updated last year
- Credax - Fuzzing Tool with Slack Notifications. Also removes false positive responses.☆10Updated 3 years ago
- Unauthenticated Path Traversal in Nexus Repository 3☆2Updated 5 months ago
- Repository of useful payloads and tips for pentesting/bug bounty.☆25Updated last week
- offy is a tool for bugbounty hunters to save money in their EC2 instances☆13Updated last year
- Ffuf output browser☆37Updated last year
- ☆12Updated 3 years ago
- Monitor your target continuously for new subdomains!☆26Updated last year
- ☆43Updated last year
- Public repo of Nuclei scanner templates.☆18Updated last year
- GetSimple CMS Custom JS Plugin Exploit RCE Chain☆11Updated last year
- ☆13Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated 4 months ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated last year
- Automate Auxiliary Module in Metasploit☆20Updated 3 years ago
- Most common AWS S3 bucket names.☆26Updated 4 years ago