Takeover subdomains using AWS dangling elastic ips and have a working POC for Subdomain Takeover.
☆93Jul 9, 2025Updated 8 months ago
Alternatives and similar repositories for Taken
Users that are interested in Taken are comparing it to the libraries listed below
Sorting:
- Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for m…☆12Feb 1, 2022Updated 4 years ago
- Find orphaned IP's on cloud services☆29Oct 23, 2019Updated 6 years ago
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆15Aug 2, 2021Updated 4 years ago
- Extract SSL certificate data (Subject Name, Subject Alt Names, Organisation)☆42Nov 10, 2025Updated 4 months ago
- A tool to perform permutations, mutations and alteration of subdomains in golang.☆156Nov 24, 2023Updated 2 years ago
- Security tool to find potential vulnerable Server Side Request Forgery (SSRF) parameters.☆356Feb 13, 2026Updated last month
- tool that generates bypasses for open redirects☆51Apr 18, 2022Updated 3 years ago
- BugBounty , sort and delete duplicates param value without missing original value☆22Jul 31, 2021Updated 4 years ago
- Prototype pollution scanner using headless chrome☆217Jul 27, 2022Updated 3 years ago
- sub domain wild card filtering tool☆40Apr 18, 2020Updated 5 years ago
- Bug Bounty tool to automate the recon process.☆12Oct 4, 2023Updated 2 years ago
- Secret and/or credential patterns used for gf.☆243Feb 10, 2023Updated 3 years ago
- ☆18Apr 7, 2022Updated 3 years ago
- Detects request smuggling via HTTP/2 downgrades.☆94Jul 30, 2022Updated 3 years ago
- Tool for making it easy to collect dns results from the CLI☆40Aug 14, 2024Updated last year
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- Mass querying whois records☆28Dec 28, 2021Updated 4 years ago
- A tool for append URLs, skipping duplicates/paths & combine parameters.☆128Mar 2, 2022Updated 4 years ago
- Endpoint monitor tool☆21Sep 16, 2020Updated 5 years ago
- Signatures for jaeles scanner by @j3ssie☆117Apr 20, 2024Updated last year
- ☆13Feb 26, 2021Updated 5 years ago
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago
- Customisable and automated HTTP header injection☆269Jun 27, 2024Updated last year
- Easily schedule commands to run multiple times at set intervals (like a cronjob, but with one command)☆84Apr 5, 2021Updated 4 years ago
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆560Mar 8, 2025Updated last year
- Fetches javascript file from a list of URLS or subdomains.☆838Jul 22, 2025Updated 8 months ago
- Urls de-duplication tool for better recon.☆145May 29, 2025Updated 9 months ago
- Smart ssrf scanner using different methods like parameter brute forcing in post and get...☆279Feb 11, 2021Updated 5 years ago
- Subdomains-enumeration, subdomain-takeover monitoring api and S3 bucket scanner.☆40Nov 21, 2025Updated 4 months ago
- Python Script to Print the name of the companies that are acquired by a Target Company and the Time of Acquisition.☆26Dec 5, 2021Updated 4 years ago
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆1,028Feb 22, 2026Updated 3 weeks ago
- Python utility to takeover domains vulnerable to AWS NS Takeover☆86Feb 2, 2023Updated 3 years ago
- Messy BurpSuite plugin for SQL Truncation vulnerabilities.☆63Apr 17, 2020Updated 5 years ago
- Directory/Subdomain scanner developed in GoLang.☆48Dec 5, 2020Updated 5 years ago
- CRLF and open redirect fuzzer☆112Aug 31, 2021Updated 4 years ago
- Find endpoints on GitHub.☆215Mar 28, 2023Updated 2 years ago
- Script to test open Akamai ARL vulnerability.☆69Aug 11, 2021Updated 4 years ago
- ☆299Jul 16, 2022Updated 3 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago