Krypteria / Seekolver
Seekolver is a tool focused on attack-surface mapping. It performs searches for subdomains associated with root domains and root domains associated with organisations using open sources, additionally, it resolves these domains and subdomains in search of HTTP and HTTPS services and then filters the information obtained based on their response.
☆40Updated last year
Alternatives and similar repositories for Seekolver:
Users that are interested in Seekolver are comparing it to the libraries listed below
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆27Updated last year
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆51Updated 10 months ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated last year
- Tools used for Pentesting☆22Updated last year
- Mass bruteforce authentication of network protocols☆45Updated last year
- This repository contains the best fuzzing wordlist files☆29Updated last month
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated 10 months ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆37Updated last year
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆26Updated last year
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆30Updated last year
- Script that performs a scan of a specific domain, using the following tools: Subfinder, assetfinder, amass and httpx. The result is merge…☆23Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆50Updated 3 months ago
- Fast Path Traversal exploitation tool☆21Updated 9 months ago
- Enumeration & fingerprint tool☆24Updated 10 months ago
- Chrome extension tool for OSINT & Recon☆50Updated 10 months ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆40Updated last year
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆38Updated last week
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year
- aws cli pentesting/red team snippets☆32Updated last year
- FireHawk: The Elite Firebase Security Testing Utility☆18Updated 8 months ago
- ☆27Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆34Updated last year
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆47Updated 2 years ago
- DataReaper is a powerful Python tool designed to harvest data from publicly accessible HTTP servers. It combines the capabilities of Shod…☆11Updated 11 months ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆19Updated 11 months ago
- Red Teaming tools and techniques☆48Updated last year
- ☆23Updated last year