Subdomain Takeover lab is FREE for everyone. This means here is a legal to takeover Subdomain of this website. Here you'll find more than 100+ subdomain which is waiting for TAKEOVER. For more visit:
☆24Jan 1, 2025Updated last year
Alternatives and similar repositories for SubdomainTakeoverLab
Users that are interested in SubdomainTakeoverLab are comparing it to the libraries listed below
Sorting:
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 6 years ago
- A tool to check for response status codes with ease☆13Apr 29, 2023Updated 2 years ago
- ☆18Oct 8, 2024Updated last year
- Windows File Enumeration Intel Gathering Tool.☆17Sep 4, 2023Updated 2 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Feb 6, 2022Updated 4 years ago
- Azure pentesting reference for Altered Security Lab☆25Jan 29, 2022Updated 4 years ago
- Mockingjay Process Injection Vulnerable DLL Finder☆19Jun 30, 2023Updated 2 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- HydrAttack PoC eMail Spoofer Module is designed to test the security posture of a domain against email spoofing attacks. It performs step…☆30Jul 10, 2025Updated 7 months ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆28Apr 3, 2021Updated 4 years ago
- ☆32Apr 16, 2025Updated 10 months ago
- Poc Collected for study and develop☆30Jul 2, 2020Updated 5 years ago
- Learning source code review, spot vulnerability, find some ways how to fix it.☆30Nov 17, 2022Updated 3 years ago
- ☆27Mar 25, 2021Updated 4 years ago
- ☆35Mar 28, 2025Updated 10 months ago
- Some Tutorials and Things to Help Bug Hunter☆31Mar 17, 2021Updated 4 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆36Apr 5, 2022Updated 3 years ago
- Perform Windows domain enumeration via LDAP☆37Jun 7, 2022Updated 3 years ago
- Azure AD (Entra ID) enumeration tool. Find related domains and tenant information in a simple way.☆35Oct 4, 2024Updated last year
- JWT Attack to change the algorithm RS256 to HS256☆34May 8, 2023Updated 2 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆32Aug 28, 2023Updated 2 years ago
- Scrapes your order history, storing it as a csv☆12Jul 13, 2016Updated 9 years ago
- Detectify Crowdsource Challenge☆72Apr 26, 2022Updated 3 years ago
- Writeups for Vulnhub, Tryhackme and Others☆13Jun 25, 2023Updated 2 years ago
- ☆10Feb 8, 2026Updated 2 weeks ago
- ☆10Jul 21, 2021Updated 4 years ago
- Inject shellcode into a valid BMP/GIF image.☆34Sep 7, 2020Updated 5 years ago
- ☆38Jan 14, 2022Updated 4 years ago
- An example of a vulnerability in the early JWT token node.js library☆37Apr 6, 2023Updated 2 years ago
- DLL Exports Extraction BOF with optional NTFS transactions.☆90Nov 5, 2021Updated 4 years ago
- SprayShark is a modular G-Suite password sprayer with threading!☆57May 17, 2025Updated 9 months ago
- ☆35Mar 14, 2022Updated 3 years ago
- BloodHound Data Scanner☆45Jul 7, 2020Updated 5 years ago
- ☆10Jun 13, 2024Updated last year
- ReconX is a powerful automated reconnaissance and vulnerability scanning tool designed for ethical hackers, penetration testers, and secu…☆16Feb 27, 2025Updated last year
- PHP Application To Spoof And Send E-mail.☆10Jan 4, 2016Updated 10 years ago
- ☆11Dec 5, 2020Updated 5 years ago
- Yandex browser password recovery☆11Apr 9, 2025Updated 10 months ago