JordyZomer / autoSubTakeover
A tool used to check if a CNAME resolves to the scope address. If the CNAME resolves to a non-scope address it might be worth checking out if subdomain takeover is possible.
☆130Updated last year
Related projects: ⓘ
- CollabOzark is a simple tool which helps the researchers track SSRF, RCE, Blind XSS, XXE, External Resource Access payloads triggers.☆136Updated 4 years ago
- ☆119Updated 7 years ago
- XSS Hunter Burp Plugin☆148Updated 6 years ago
- A collection of scripts to extend Burp Suite☆138Updated 5 years ago
- This repository contains all the material from the talk "Practical recon techniques for bug hunters & pentesters" given at Bugcrowd Level…☆60Updated 5 years ago
- A tool to hunt for publicly accessible DigitalOcean Spaces☆154Updated 4 years ago
- Keye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will m…☆100Updated 4 years ago
- Resolve and quickly portscan a list of (sub)domains.☆85Updated 8 years ago
- Wordlist for content(directory) bruteforce discovering with Burp or dirsearch☆210Updated 2 years ago
- subdomain bruteforce list☆96Updated 2 years ago
- ☆28Updated 3 years ago
- A script to extract subdomains/emails for a given domain using SSL/TLS certificate dataset on Censys☆152Updated last year
- Push notifications for passive DNS data☆105Updated 8 years ago
- ☆207Updated this week
- This tool is for automate the initial things that we usually do in daily pentesting. So you can focus more on the main target.☆77Updated 4 years ago
- ☆270Updated 2 years ago
- Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED]☆301Updated 5 years ago
- Leverage certificate transparency live feed to monitor for newly issued subdomain certificates (last 90 days, configurable), for domains …☆219Updated last year
- Various Payload wordlists☆233Updated 4 years ago
- ☆231Updated 6 years ago
- Burp Suite Extension to monitor new scope☆195Updated 3 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆162Updated 4 years ago
- Repo of useful scripts☆104Updated 4 years ago
- Local File Inclusion Exploitation Tool (mirror)☆121Updated 7 years ago
- Toolset for detecting reflected xss in websites☆109Updated 5 years ago
- Brute force AWS bucket finder☆58Updated last year
- Actarus is a custom tool for bug bounty☆75Updated 4 years ago
- A script to extract domain names from Content Security Policy(CSP) headers☆105Updated 5 years ago
- ☆127Updated 6 years ago
- Payloads for CRLF Injection☆210Updated 2 years ago