Krypteria / SeekolverLinks
Seekolver is a tool focused on attack-surface mapping. It performs searches for subdomains associated with root domains and root domains associated with organisations using open sources, additionally, it resolves these domains and subdomains in search of HTTP and HTTPS services and then filters the information obtained based on their response.
☆40Updated 2 years ago
Alternatives and similar repositories for Seekolver
Users that are interested in Seekolver are comparing it to the libraries listed below
Sorting:
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Updated 2 years ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆52Updated last year
- Tools used for Pentesting☆22Updated 2 years ago
- Web Path Finder☆60Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Updated 2 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Capture screenshots of onion services on an onion service.☆73Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Updated last year
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated last year
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆29Updated 2 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Updated 2 years ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Updated last year
- hashtray is an OSINT (Open Source Intelligence) tool designed to find a Gravatar account associated with an email address and to locate a…☆60Updated 3 weeks ago
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆85Updated 2 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Updated last year
- XML-RPC Vulnerability Checker and Directory Fuzzer☆22Updated 2 years ago
- A fast Go-based tool to uncover sensitive information in JavaScript☆37Updated 7 months ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Updated 2 years ago
- ☆13Updated 3 years ago
- Tool for bypassing logins vulnerable against SQL injection☆46Updated last year
- Terminal based fake identity generator.☆26Updated 2 years ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆138Updated last year
- ☆43Updated 9 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆49Updated last year
- ☆19Updated 2 years ago
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Updated 2 years ago
- A Red Teaming tool focused on profiling the target.☆29Updated last month
- ☆25Updated 3 years ago
- ☁️ Curated Cloud OSINT resources — dorks, tools, and techniques for AWS, Azure, GCP, Oracle Cloud, and other major providers reconnaissan…☆110Updated 2 weeks ago