Krypteria / SeekolverLinks
Seekolver is a tool focused on attack-surface mapping. It performs searches for subdomains associated with root domains and root domains associated with organisations using open sources, additionally, it resolves these domains and subdomains in search of HTTP and HTTPS services and then filters the information obtained based on their response.
☆40Updated 2 years ago
Alternatives and similar repositories for Seekolver
Users that are interested in Seekolver are comparing it to the libraries listed below
Sorting:
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Updated 2 years ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆54Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Updated 2 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆40Updated 2 years ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆136Updated last year
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆44Updated 7 months ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- Capture screenshots of onion services on an onion service.☆72Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆45Updated last year
- Tools used for Pentesting☆22Updated 2 years ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Updated last year
- Web Path Finder☆60Updated 2 years ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆29Updated last year
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Updated 2 years ago
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆84Updated 2 years ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Updated 2 years ago
- Automate Scoping, OSINT and Recon assessments.☆98Updated 2 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- Python-based web scraper for a darkweb marketplace on the Tor network.☆37Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆64Updated last year
- Discovering Typo Squatting on your domains!☆80Updated last year
- ☆27Updated 2 years ago
- ☆24Updated 2 years ago
- hashtray is an OSINT (Open Source Intelligence) tool designed to find a Gravatar account associated with an email address and to locate a…☆54Updated last month
- ☆43Updated 8 months ago