UnaPibaGeek / ctfr
Abusing Certificate Transparency logs for getting HTTPS websites subdomains.
☆1,995Updated last year
Alternatives and similar repositories for ctfr:
Users that are interested in ctfr are comparing it to the libraries listed below
- File upload vulnerability scanner and exploitation tool.☆3,166Updated last year
- A Tool for Domain Flyovers☆5,712Updated 2 years ago
- Command line utility for searching and downloading exploits☆1,748Updated 8 months ago
- This tool can be used to brute discover GET and POST parameters☆1,361Updated 5 years ago
- The XSS Hunter service - a portable version of XSSHunter.com☆1,512Updated 2 years ago
- Knock Subdomain Scan☆3,932Updated 2 months ago
- A default credential scanner.☆1,464Updated 3 years ago
- Find web directories without bruteforce☆1,802Updated last year
- HTTP parameter discovery suite.☆5,431Updated last month
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,372Updated last month
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,229Updated 7 months ago
- Detect and bypass web application firewalls and protection systems☆2,715Updated 6 months ago
- ☆2,200Updated last year
- Subdomain enumeration and information gathering tool☆1,221Updated 3 months ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,078Updated this week
- Striker is an offensive information and vulnerability scanner.☆2,252Updated last year
- DNS Enumeration Script☆2,709Updated this week
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,739Updated 3 years ago
- Subdomain Takeover tool written in Go☆1,937Updated last year
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,139Updated 8 months ago
- Automated All-in-One OS Command Injection Exploitation Tool.☆4,724Updated this week
- A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)☆3,250Updated 3 weeks ago
- NSE script based on Vulners.com API☆3,269Updated 10 months ago
- A python script that finds endpoints in JavaScript files☆3,821Updated 10 months ago
- Know the dangers of credential reuse attacks.☆2,043Updated 4 months ago
- Scan for misconfigured S3 buckets across S3-compatible APIs!☆2,667Updated this week
- The fastest and complete solution for domain recognition. Supports screenshoting, port scan, HTTP check, data import from other tools, su…☆3,404Updated 11 months ago
- Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.☆1,484Updated 11 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,153Updated 3 months ago
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆2,286Updated 10 months ago