A tool for Subdomain takeovers detection
☆26Oct 21, 2022Updated 3 years ago
Alternatives and similar repositories for Astra
Users that are interested in Astra are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- H&E- Burp Highlighter and Extractor☆18Mar 29, 2023Updated 2 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Jan 31, 2021Updated 5 years ago
- A modern tool written in python for hunting open redirection☆29Aug 8, 2023Updated 2 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Aug 26, 2022Updated 3 years ago
- Automatically deploy a Cuckoo sandbox☆23Jun 6, 2023Updated 2 years ago
- An intentionally-vulnerable application for demonstrating the hazards of SpEL expression composition☆28Apr 17, 2018Updated 7 years ago
- A XSS mind map ;)☆57Jan 16, 2016Updated 10 years ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆14Jun 13, 2023Updated 2 years ago
- Sweetuu is a Advance Shell which can be used to achieve RCE easily through LFI & RFI. For easy wins in bug bounty, upload sweetuu instead…☆10Dec 16, 2024Updated last year
- Collection of tools to interact with Intigriti website☆17Aug 10, 2024Updated last year
- List all public repositories for (valid) GitHub usernames☆77Sep 25, 2023Updated 2 years ago
- ☆13Mar 28, 2024Updated last year
- ECOin is a P2P crypto-currency with the goal of providing a long-term energy-efficient digital economy strategy.☆13Feb 28, 2026Updated 3 weeks ago
- A Programmer☆14Dec 20, 2025Updated 3 months ago
- All in one tool to make your hacking easier.☆199Mar 7, 2022Updated 4 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- pArAnoIA - Tiny "Secure" Browser☆12Nov 2, 2024Updated last year
- A burp-suite plugin that extract all parameter names from in-scope requests☆29Nov 9, 2021Updated 4 years ago
- Tool to automate recon☆45Dec 28, 2021Updated 4 years ago
- Demo of the URLClassLoader JAR-swapping showing the ability to replace and exploit an already loaded JAR with inner classes☆32Dec 10, 2022Updated 3 years ago
- Perform bulk URL status checks and track changes.☆40Feb 13, 2022Updated 4 years ago
- A web-based serverless application which works on a decentralized system for handling transactions between users ruling out the utilizati…☆13May 6, 2022Updated 3 years ago
- 🔍LeakScanner - Inspired by Gitleaks☆14Aug 23, 2024Updated last year
- ☆13Jul 13, 2023Updated 2 years ago
- A training course on Web Security, Exploit Development and Source Code Auditing from 2009.☆12Feb 15, 2022Updated 4 years ago
- Fast and lightweight Web Application Firewall Fingerprinting tool☆64Dec 21, 2024Updated last year
- An AIO Tool to check for Vulnerable Amazon S3 Buckets as part of Bug Bounty, the uniqueness of this tool is that it can take a file full …☆44Sep 6, 2024Updated last year
- Docker SSH Tunnel☆12Mar 17, 2026Updated last week
- Fast Subdomain Enumeration Tool made with Bash only 💯☆15Nov 3, 2021Updated 4 years ago
- A hacking tool for bug bounties. Sharing and modifying is encouraged!☆242Dec 5, 2022Updated 3 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆12Feb 16, 2021Updated 5 years ago
- ☆12Jan 4, 2022Updated 4 years ago
- Burp suite Certificate modification tool☆18Apr 23, 2023Updated 2 years ago
- ☆18Jun 26, 2017Updated 8 years ago
- PrettyRecon-cli is an unofficial cli client for PrettyRecon. This tool can be used to trigger various tasks on prettyrecon as well as fe…☆10May 9, 2025Updated 10 months ago
- Tool to find stored robots.txt files from the past☆19Jun 4, 2023Updated 2 years ago
- Predicting the probability of an exploit being released after a CVE is published (by Machine learning algorithm)☆13Aug 8, 2023Updated 2 years ago
- A Burp Suite extension to extract datas from source code while browsing.☆161Mar 20, 2024Updated 2 years ago
- just a basic rootkit for learning how to playing sys_call_table☆16Sep 12, 2016Updated 9 years ago