EN5R / SubCortexLinks
SubCortex is a fast and efficient tool for passive subdomain enumeration. It aggregates subdomain data from multiple APIs, helping penetration testers and security researchers discover valid subdomains for websites quickly and effectively.
☆16Updated 4 months ago
Alternatives and similar repositories for SubCortex
Users that are interested in SubCortex are comparing it to the libraries listed below
Sorting:
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆43Updated 2 months ago
- PassBreaker☆65Updated last year
- Tool for bypassing logins vulnerable against SQL injection☆46Updated last year
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated 2 years ago
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆20Updated last year
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆32Updated last year
- ☆13Updated last year
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated last year
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆54Updated last year
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆41Updated last year
- CoupDeWeb is an automated web vulnerability scanner designed for security researchers and developers. It scans for potential vulnerable …☆27Updated last year
- ☆19Updated 8 months ago
- CVE-2024-28955 Exploitation PoC☆34Updated last year
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆47Updated 5 months ago
- Auto exploitation tool for CVE-2024-24401.☆36Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆37Updated 2 years ago
- CrlfiX☆20Updated 10 months ago
- A tool for automatically change the Tor IP address over time.☆117Updated 8 months ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆187Updated last year
- ProxyChecker Made in NodeJS☆37Updated 3 years ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆74Updated 4 months ago
- A meticulously curated collection of exploitation tools for the discerning security professional. When precision meets power, and stealt…☆34Updated 2 weeks ago
- Kali Packerge Manager☆65Updated 2 years ago
- Automated way to extract juicy info with subfinder and waybackurls☆38Updated 3 months ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆66Updated last year
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fire…☆15Updated 4 months ago
- ☆34Updated 7 months ago
- A comprehensive web application security testing toolkit that combines 10 powerful penetration testing features into one tool.☆40Updated 7 months ago
- Automatic tool to find Google Dorks☆36Updated last year
- ☆24Updated 2 years ago