Evil-Twins-X / SubEvil
SubEvil is an advanced open source intelligence framework (OSINT) for grouping subdomains.
☆109Updated last year
Related projects ⓘ
Alternatives and complementary repositories for SubEvil
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆69Updated 2 months ago
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆119Updated last month
- SQLMutant is a comprehensive SQL injection testing tool that provides several features to test for SQL injection vulnerabilities in web a…☆112Updated 2 months ago
- [EN] BETA: Layla - recon tool for bug bounty☆77Updated 2 years ago
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆84Updated last year
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆119Updated 2 months ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆104Updated 5 months ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆145Updated 10 months ago
- All About Web Recon & OSINT☆102Updated last year
- A multi web security purposes tool☆37Updated 4 months ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆48Updated 8 months ago
- AutoRecon-XSS is a script designed for automated reconnaissance of XSS vulnerabilities. It crawls the target URL or alive domains, extrac…☆131Updated 8 months ago
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆89Updated 3 months ago
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆210Updated 2 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆124Updated 4 months ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Updated 9 months ago
- Bypass 403☆117Updated 3 months ago
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆99Updated last year
- ScopeHunter is a command-line tool for finding in scope targets for bug bounty programs.☆60Updated 2 months ago
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆143Updated 6 months ago
- Ultimate Google Dork Lists OSWP top 10☆49Updated 3 months ago
- Nuclei (https://github.com/projectdiscovery/nuclei) templates for extracting juicy info from web pages☆173Updated last year
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆64Updated 8 months ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆67Updated last year
- An OSINT focused tool made with Nodejs!☆90Updated 2 years ago
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆94Updated 3 weeks ago
- Collect XSS vulnerable parameters from entire domain.☆145Updated 2 years ago
- ☆47Updated last year
- Tool for automate bug hunting process 🔍 --> 🍭☆34Updated 3 months ago