Abusing Certificate Transparency logs for getting HTTPS websites subdomains.
☆2,089Jan 2, 2024Updated 2 years ago
Alternatives and similar repositories for ctfr
Users that are interested in ctfr are comparing it to the libraries listed below
Sorting:
- A Tool for Domain Flyovers☆5,906May 22, 2022Updated 3 years ago
- Scan for misconfigured S3 buckets across S3-compatible APIs!☆2,997Dec 11, 2025Updated 2 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,650Jan 5, 2026Updated last month
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,477Jan 9, 2025Updated last year
- Knock Subdomain Scan☆4,138Feb 19, 2026Updated last week
- Fast subdomains enumeration tool for penetration testers☆10,841Aug 2, 2024Updated last year
- Know the dangers of credential reuse attacks.☆2,094Dec 9, 2025Updated 2 months ago
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,285Aug 18, 2025Updated 6 months ago
- Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors…☆1,297Dec 23, 2018Updated 7 years ago
- This tool can be used to brute discover GET and POST parameters☆1,394Aug 24, 2019Updated 6 years ago
- A swiss army knife for pentesting networks☆9,082Dec 6, 2023Updated 2 years ago
- A Powerful Subdomain Takeover Tool☆964Oct 17, 2023Updated 2 years ago
- Extract subdomains from SSL certificates in HTTPS sites.☆389Mar 3, 2025Updated last year
- A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)☆3,541Jul 21, 2025Updated 7 months ago
- Find interesting Amazon S3 Buckets by watching certificate transparency logs.☆1,800Feb 28, 2025Updated last year
- Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment☆1,194Oct 24, 2018Updated 7 years ago
- Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain name…☆1,643Jun 6, 2024Updated last year
- Attack Surface Management Platform☆9,418Feb 15, 2026Updated 2 weeks ago
- HTA encryption tool for RedTeams☆1,422Nov 9, 2022Updated 3 years ago
- The fastest and complete solution for domain recognition. Supports screenshoting, port scan, HTTP check, data import from other tools, su…☆3,690Feb 20, 2026Updated last week
- Security Tool to Look For Interesting Files in S3 Buckets☆1,456Apr 10, 2024Updated last year
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,565Feb 8, 2025Updated last year
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,213Aug 7, 2025Updated 6 months ago
- Subdomain Takeover tool written in Go☆2,028Aug 13, 2023Updated 2 years ago
- ☆2,316Dec 8, 2023Updated 2 years ago
- HTTP parameter discovery suite.☆6,091Feb 20, 2025Updated last year
- Tool to scan for secret files on HTTP servers☆2,103Feb 4, 2026Updated last month
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,903Sep 27, 2021Updated 4 years ago
- A python script that finds endpoints in JavaScript files☆4,294Apr 13, 2024Updated last year
- Fast passive subdomain enumeration tool.☆13,159Feb 25, 2026Updated last week
- File upload vulnerability scanner and exploitation tool.☆3,300May 8, 2025Updated 9 months ago
- Automated All-in-One OS Command Injection Exploitation Tool☆5,640Feb 22, 2026Updated last week
- In-depth attack surface mapping and asset discovery☆14,193Updated this week
- Most advanced XSS scanner.☆14,773Apr 26, 2025Updated 10 months ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- Analyze the security of any domain by finding all the information possible. Made in python.☆1,861Dec 29, 2022Updated 3 years ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,377Updated this week
- MSDAT: Microsoft SQL Database Attacking Tool☆982Aug 1, 2023Updated 2 years ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,379May 22, 2020Updated 5 years ago