Krypteria / SeekolverLinks
Seekolver is a tool focused on attack-surface mapping. It performs searches for subdomains associated with root domains and root domains associated with organisations using open sources, additionally, it resolves these domains and subdomains in search of HTTP and HTTPS services and then filters the information obtained based on their response.
☆39Updated last year
Alternatives and similar repositories for Seekolver
Users that are interested in Seekolver are comparing it to the libraries listed below
Sorting:
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆39Updated last year
- Tools used for Pentesting☆22Updated 2 years ago
- Web Path Finder☆61Updated last year
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆53Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year
- Terminal based fake identity generator.☆26Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 9 months ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆44Updated last year
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆27Updated last year
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆43Updated last month
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Updated 2 years ago
- Automate Scoping, OSINT and Recon assessments.☆96Updated 5 months ago
- Tool for bypassing logins vulnerable against SQL injection☆46Updated last year
- Chrome extension tool for OSINT & Recon☆53Updated last year
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆48Updated last month
- 🚀 CSRFShark - a utility for manipulating cross-site request forgery attacks☆34Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- ☆43Updated 2 months ago
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆78Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆23Updated 3 years ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated 7 months ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- Fetch information about a public Google document.☆13Updated last year
- PassMute - A multi featured Password Transmutation/Mutator Tool☆52Updated 2 years ago
- This repository contains the best fuzzing wordlist files☆34Updated 7 months ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆27Updated last year
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆42Updated 4 months ago