Krypteria / SeekolverLinks
Seekolver is a tool focused on attack-surface mapping. It performs searches for subdomains associated with root domains and root domains associated with organisations using open sources, additionally, it resolves these domains and subdomains in search of HTTP and HTTPS services and then filters the information obtained based on their response.
☆39Updated last year
Alternatives and similar repositories for Seekolver
Users that are interested in Seekolver are comparing it to the libraries listed below
Sorting:
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆39Updated last year
- Tools used for Pentesting☆22Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 11 months ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆54Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Updated 2 years ago
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Updated 2 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆132Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆27Updated last year
- Web Path Finder☆61Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆40Updated 2 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Automate Scoping, OSINT and Recon assessments.☆96Updated 7 months ago
- Tool for bypassing logins vulnerable against SQL injection☆46Updated last year
- Discovering Typo Squatting on your domains!☆71Updated last year
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆79Updated last year
- Fetch data (open ports, CVEs, CPEs, ...) from shodan internetDB API☆91Updated 2 years ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆29Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆23Updated 3 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆43Updated last year
- Terminal based fake identity generator.☆26Updated 2 years ago
- A small executable to trick a user to authenticate using code matching MFA☆69Updated last year
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Updated last year
- ☆28Updated 2 years ago
- ☆13Updated 3 years ago
- ☆78Updated last year