Krypteria / Seekolver
Seekolver is a tool focused on attack-surface mapping. It performs searches for subdomains associated with root domains and root domains associated with organisations using open sources, additionally, it resolves these domains and subdomains in search of HTTP and HTTPS services and then filters the information obtained based on their response.
☆39Updated last year
Alternatives and similar repositories for Seekolver
Users that are interested in Seekolver are comparing it to the libraries listed below
Sorting:
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Tool for scanning domains for .git directories.☆16Updated last year
- Tools used for Pentesting☆22Updated 2 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆18Updated 9 months ago
- This repository contains the best fuzzing wordlist files☆29Updated 5 months ago
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- Herramienta en Bash ideal para extraer la información más relevante de un dominio vía rpcclient.☆18Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- DataReaper is a powerful Python tool designed to harvest data from publicly accessible HTTP servers. It combines the capabilities of Shod…☆11Updated last year
- 🚀 CSRFShark - a utility for manipulating cross-site request forgery attacks☆33Updated last year
- ☆42Updated 3 weeks ago
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Updated 2 years ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- Windows priviledge escalation script☆13Updated 3 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆42Updated last year
- masscan with exclusive excludes☆56Updated last year
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆26Updated last year
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Updated 11 months ago
- Terminal based fake identity generator.☆26Updated last year
- Script that performs a scan of a specific domain, using the following tools: Subfinder, assetfinder, amass and httpx. The result is merge…☆23Updated 3 years ago
- ☆17Updated last year
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 7 months ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆27Updated last year
- vhost scanning☆34Updated last year