The Internets #1 Subdomain Takeover Tool
☆299Jun 4, 2025Updated 8 months ago
Alternatives and similar repositories for Subdominator
Users that are interested in Subdominator are comparing it to the libraries listed below
Sorting:
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆436Updated this week
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆463Mar 28, 2024Updated last year
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,267Jul 18, 2024Updated last year
- A tech enumeration toolkit focused on 404 Not found pages.☆26Oct 6, 2024Updated last year
- PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.☆234Jul 8, 2025Updated 7 months ago
- Pen Test Report Generation and Assessment Collaboration☆590Feb 22, 2026Updated last week
- DriveFS Sleuth is a Python tool that automates investigating Google Drive File Stream disk artifacts, the tool has been developed based o…☆87Dec 20, 2024Updated last year
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆728Jan 25, 2026Updated last month
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆131Jan 28, 2025Updated last year
- A GO module to get domain name from SSL certificates when an IP address is provided.☆33Apr 14, 2023Updated 2 years ago
- ☆28Jan 6, 2024Updated 2 years ago
- This Burp extension extracts various data (path, parameter keys, parameter values, subdomains, etc.) from the sitemap. This data is used …☆43Sep 9, 2021Updated 4 years ago
- Tool to parse subdomains from dmarc.live☆150Apr 19, 2024Updated last year
- The useful exploit finder☆826Jan 19, 2026Updated last month
- A rapid HTTP downgrade smuggling scanner written in Go.☆313May 16, 2024Updated last year
- Curated UTF-8 URL-encoded character dictionary for injection testing, fuzzing, and bypass techniques against web applications and APIs, f…☆13Sep 20, 2021Updated 4 years ago
- Cross-Site Scripting (XSS) is one of the most well known web application vulnerabilities. It even has a dedicated chapter in the OWASP To…☆12Jan 30, 2023Updated 3 years ago
- ⚡ Vigil ⚡ Detect prompt injections, jailbreaks, and other potentially risky Large Language Model (LLM) inputs☆458Jan 31, 2024Updated 2 years ago
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆1,024Feb 22, 2026Updated last week
- ☆522Apr 29, 2024Updated last year
- Discover new target domains using Content Security Policy☆503Feb 7, 2026Updated 3 weeks ago
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆299Sep 8, 2023Updated 2 years ago
- ☆24Jan 15, 2024Updated 2 years ago
- An IIS short filename enumeration tool☆1,123Nov 25, 2024Updated last year
- 「🔑」A tool used to hunt down API key leaks in JS files and pages☆836Sep 4, 2025Updated 5 months ago
- Seecurity helper tool to detect entry points of WordPress plugins☆10May 16, 2024Updated last year
- ServiceNow widge-simple-list misconfiguration scanner☆65Nov 16, 2023Updated 2 years ago
- Laravel PHP framework black-box vulnerability scanner☆36Sep 3, 2024Updated last year
- A script to automatically dump all URLs present in /server-status to a file locally.☆24Feb 11, 2025Updated last year
- ☆380May 17, 2023Updated 2 years ago
- A simple Burp Suite extension to crawl JavaScript (JS) files in passive mode and display the results directly on the issues☆374Jul 25, 2023Updated 2 years ago
- tool that generates bypasses for open redirects☆51Apr 18, 2022Updated 3 years ago
- De-clutter a list of URLs☆386Feb 3, 2026Updated 3 weeks ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Jun 21, 2024Updated last year
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,372Updated this week
- Lambda function that streamlines containment of an AWS account compromise☆344Dec 1, 2023Updated 2 years ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,196Oct 6, 2025Updated 4 months ago
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆266Nov 21, 2025Updated 3 months ago
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆81Nov 24, 2025Updated 3 months ago