Fast subdomains enumeration tool for penetration testers
☆117Feb 3, 2019Updated 7 years ago
Alternatives and similar repositories for Sublist3r
Users that are interested in Sublist3r are comparing it to the libraries listed below
Sorting:
- An automation framework for running multiple open sourced subdomain bruteforcing tools (in parallel) using your own wordlists via Docker …☆260Aug 22, 2021Updated 4 years ago
- A Pythonic wrapper to MassDNS☆24Mar 21, 2018Updated 7 years ago
- This tool can be used to brute discover GET and POST parameters☆1,394Aug 24, 2019Updated 6 years ago
- ☆477Jan 29, 2021Updated 5 years ago
- A collection of the solutions people wrote for the H1-212 Capture The Flag event☆97Jan 10, 2019Updated 7 years ago
- AWS Extender (Cloud Storage Tester) is a Burp plugin to assess permissions of cloud storage containers on AWS, Google Cloud and Azure.☆256Feb 23, 2022Updated 4 years ago
- A script to enumerate virtual hosts on a server.☆691Dec 28, 2017Updated 8 years ago
- ☆831Nov 13, 2023Updated 2 years ago
- Setup script for Regon-ng☆938Nov 17, 2020Updated 5 years ago
- A collection of scripts that run on my web server. Mainly for debugging SSRF, blind XSS, and XXE vulnerabilities.☆549Jun 12, 2017Updated 8 years ago
- Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆83Sep 19, 2017Updated 8 years ago
- Project "Flashbang" - An open-source Flash-security helper☆205Apr 19, 2015Updated 10 years ago
- A python script that filters, checks the validity, generates clickable link(s) of subdomain(s), and reports their status☆89Oct 29, 2020Updated 5 years ago
- PoC for an adaptive parallelised DNS prober☆109Oct 4, 2022Updated 3 years ago
- XSS Hunter Burp Plugin☆151Aug 31, 2018Updated 7 years ago
- This repository contains all the material from the talk "Esoteric sub-domain enumeration techniques" given at Bugcrowd LevelUp 2017 virtu…☆628Feb 5, 2019Updated 7 years ago
- RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: h…☆307Oct 18, 2017Updated 8 years ago
- A tool to capture all the git secrets by leveraging multiple open source git searching tools☆1,142Jun 25, 2019Updated 6 years ago
- a tiny tool for swf hacking, just browse it:)☆243Mar 13, 2013Updated 12 years ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,477Jan 9, 2025Updated last year
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆200Nov 19, 2017Updated 8 years ago
- Vulnerability scanner based on vulners.com search API☆885Oct 1, 2025Updated 5 months ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆378Oct 12, 2020Updated 5 years ago
- Some tools to automate recon - 003random☆294Jun 5, 2018Updated 7 years ago
- Plaintext Password harvesting from Azure Windows VMs☆68Mar 19, 2018Updated 7 years ago
- ☆250Jun 6, 2018Updated 7 years ago
- dork scanner with Sqli and Lfi testing☆28Apr 29, 2018Updated 7 years ago
- SSLScrape | A scanning tool for scaping hostnames from SSL certificates.☆338Apr 29, 2021Updated 4 years ago
- A collection of random scripts.☆10Jul 20, 2015Updated 10 years ago
- ☆332Jan 8, 2018Updated 8 years ago
- A small tool that extracts relative URLs from a file.☆768Sep 23, 2020Updated 5 years ago
- ☆276Oct 19, 2021Updated 4 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆536Jun 5, 2022Updated 3 years ago
- A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)☆3,544Jul 21, 2025Updated 7 months ago
- It's bloody scantastic☆239Jun 21, 2022Updated 3 years ago
- This project is just a dumping ground for random scripts I've developed.☆139Aug 14, 2024Updated last year
- A tool used to check if a CNAME resolves to the scope address. If the CNAME resolves to a non-scope address it might be worth checking ou…☆134Aug 14, 2023Updated 2 years ago
- Proof of concept tool used for phishing multi-factor authentication on O365☆14Aug 8, 2018Updated 7 years ago
- Network share sniffer and auto-mounter for crawling remote file systems☆212Mar 27, 2022Updated 3 years ago