SubCortex is a fast and efficient tool for passive subdomain enumeration. It aggregates subdomain data from multiple APIs, helping penetration testers and security researchers discover valid subdomains for websites quickly and effectively.
☆16Jul 10, 2025Updated 10 months ago
Alternatives and similar repositories for SubCortex
Users that are interested in SubCortex are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Эксплойт для уязвимости CVE-2024-0039 на Android, который позволяет выполнять произвольный код через MP4 файл. Этот репозиторий создан дл…☆12May 29, 2024Updated last year
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆32Jul 21, 2024Updated last year
- ☆14Nov 8, 2024Updated last year
- Auto exploitation tool for CVE-2024-24401.☆36Sep 7, 2024Updated last year
- ☆23Sep 19, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- HideMePlease is a new generation tool to hide phising web links into legitimate web links with original domains (eg: facebook.com, instag…☆32Jun 3, 2024Updated last year
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆29Jul 21, 2024Updated last year
- BlueStacks privilege escalation through VM backdooring☆21Jul 16, 2024Updated last year
- 🔍 SubWatch – Automated Subdomain Monitoring Script☆44Jun 13, 2025Updated 11 months ago
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆14Nov 1, 2024Updated last year
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- anveshan is a completed script that helps to automate your recon process, It finds subdomains, urls, js files, parameters, screenshots, a…☆30Oct 29, 2024Updated last year
- Proof of Concept Exploit for CVE-2024-9464☆44Oct 9, 2024Updated last year
- SSH Backdoor for android☆12Oct 4, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Fake-Out : Fake-Out is an email spoofing tool created by HackEthics138, with security measures provided by Team Illusion. Thi…☆12Aug 19, 2024Updated last year
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15May 15, 2024Updated 2 years ago
- ☆13May 21, 2025Updated 11 months ago
- OOB listener powered by cloudflare workers☆12Apr 13, 2025Updated last year
- ☆12Jul 4, 2024Updated last year
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated 2 years ago
- ☆10Jun 15, 2024Updated last year
- Pyload RCE with js2py sandbox escape☆18Oct 26, 2024Updated last year
- An efficient Python script to obfuscate code by renaming identifiers.☆12Jun 29, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- CrlfiX☆22Jan 30, 2025Updated last year
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- ☆12Aug 29, 2024Updated last year
- Torrentpier v2.4.1. CVE-2024-1651. Remote Code Execution (RCE). Exploit.☆15Mar 7, 2024Updated 2 years ago
- A high-performance domain scanner that discovers active domains by testing multiple Top-Level Domains (TLDs) for given domain names.☆32Apr 20, 2026Updated last month
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆16Mar 11, 2024Updated 2 years ago
- Brew Local Privilege Escalation exploit on Intel macOS☆19Mar 6, 2024Updated 2 years ago
- CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support☆63Jul 7, 2024Updated last year
- example using NtCreateUserProcess in rust☆19Jan 20, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- fully Undetectable payload generator for metasploit☆11Feb 1, 2023Updated 3 years ago
- ☆13Mar 6, 2025Updated last year
- A PoC exploit for CVE-2024-4577 - PHP CGI Argument Injection Remote Code Execution (RCE)☆10Jul 12, 2024Updated last year
- ☆16May 29, 2024Updated last year
- Use WordPress pingback.ping to transfer files.☆16Feb 25, 2024Updated 2 years ago
- ☆12May 5, 2024Updated 2 years ago
- 一个窃取谷歌浏览器保存的密码的示例程序 ,不会被杀毒软件识别,提示大家对数据安全的注意!(A sample program that steals passwords saved in Google Chrome without being detected by antiv…☆10Jul 20, 2023Updated 2 years ago