UnaPibaGeek / ctfr
Abusing Certificate Transparency logs for getting HTTPS websites subdomains.
☆2,016Updated last year
Alternatives and similar repositories for ctfr:
Users that are interested in ctfr are comparing it to the libraries listed below
- A Tool for Domain Flyovers☆5,747Updated 2 years ago
- DNS Enumeration Script☆2,750Updated last week
- File upload vulnerability scanner and exploitation tool.☆3,190Updated 2 years ago
- Command line utility for searching and downloading exploits☆1,759Updated 10 months ago
- Knock Subdomain Scan☆3,967Updated 5 months ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,401Updated 3 months ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,230Updated this week
- This tool can be used to brute discover GET and POST parameters☆1,367Updated 5 years ago
- A DNS meta-query spider that enumerates DNS records, and subdomains.☆3,422Updated 3 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,258Updated 5 months ago
- A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)☆3,320Updated 2 months ago
- ☆2,257Updated last year
- Subdomain enumeration and information gathering tool☆1,279Updated this week
- HTTP parameter discovery suite.☆5,568Updated 2 months ago
- Subdomain Takeover tool written in Go☆1,959Updated last year
- The XSS Hunter service - a portable version of XSSHunter.com☆1,518Updated 2 years ago
- A default credential scanner.☆1,477Updated 3 years ago
- Pop shells like a master.☆1,455Updated 6 years ago
- A DNS reconnaissance tool for locating non-contiguous IP space.☆1,674Updated 7 months ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,251Updated 9 months ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆3,919Updated 11 months ago
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆2,340Updated last year
- Striker is an offensive information and vulnerability scanner.☆2,269Updated last year
- A curated list of the most common and most interesting robots.txt disallowed directories.☆1,455Updated 2 years ago
- The fastest and complete solution for domain recognition. Supports screenshoting, port scan, HTTP check, data import from other tools, su…☆3,434Updated last year
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,792Updated 3 years ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,151Updated 2 years ago
- A python script that finds endpoints in JavaScript files☆3,901Updated last year
- CeWL is a Custom Word List Generator☆2,182Updated 5 months ago
- Find web directories without bruteforce☆1,826Updated last year