SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty
☆18Feb 9, 2024Updated 2 years ago
Alternatives and similar repositories for Subdominator
Users that are interested in Subdominator are comparing it to the libraries listed below
Sorting:
- Web application designed to raise user awareness and fortify online identities against tracking techniques.☆39Jan 29, 2025Updated last year
- ☆13Dec 21, 2023Updated 2 years ago
- Tools to work with 23andMe and AncestryDNA raw files☆12Aug 5, 2017Updated 8 years ago
- Files for Aerospace Cybersecurity: Satellite Hacking Workshop☆49Feb 28, 2024Updated 2 years ago
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆24Nov 12, 2024Updated last year
- An R package to help in plotting PCA results nicely.☆12Jan 16, 2020Updated 6 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- System Tray Tool for WDAC☆37Jun 25, 2025Updated 8 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- ☆28Apr 4, 2023Updated 2 years ago
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated last year
- Threat Network Detection in Online Social Networks☆10Jan 20, 2017Updated 9 years ago
- CloudFlare-IP is a tool which aims to gather origin IP of the website protected by Cloudflare from the website's favicon icon using Shoda…☆65Oct 2, 2019Updated 6 years ago
- A Golang tool to whitelist ASN's based on organization name☆15Mar 7, 2022Updated 4 years ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73May 21, 2023Updated 2 years ago
- Es una herramienta para hacer geolocalizacion - hecha en python - es multifuente y correlaciona info de multiples fuentes☆31Aug 16, 2025Updated 7 months ago
- Python based Discord bot Which allows you to run tools like nmap and amass from discord☆27Oct 23, 2022Updated 3 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Apr 22, 2023Updated 2 years ago
- Secure Rust Code☆16Dec 10, 2024Updated last year
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- The NSE Script plugin integrates with Criminal IP CTI search engine for network scanning, showing IP details like WHOIS, running products…☆16Nov 29, 2023Updated 2 years ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- Apache 2.4.50 Path traversal vulnerability☆17Aug 30, 2022Updated 3 years ago
- ☆24Nov 18, 2023Updated 2 years ago
- R3D SSH Hunter: The Ultimate SSH Key and Bad Guy Tracker☆12Nov 5, 2024Updated last year
- P2P encrypted messaging over Tor☆17May 3, 2024Updated last year
- Active Response plugin. Osquery to execute wazuh/ossec active response plugins. You can write your own plugins, easy to plug☆11Jun 20, 2020Updated 5 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Bash script to manage insecure web apps using docker and hosts aliases for pentest practice☆38Jan 3, 2026Updated 2 months ago
- A curated repository of the tools, scripts, resources and programs I use regularly for CTF, BB or other security work.☆15Aug 4, 2021Updated 4 years ago
- ☆15Jul 3, 2025Updated 8 months ago
- Tool to use Nmap, in Flask with different types of scans. 👁☆14Mar 12, 2026Updated last week
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago
- Provides safety features used by the horde.☆14Jul 22, 2025Updated 8 months ago
- A Simple Tool to Find Shells and Some Interesting Endpoints in Websites☆31Aug 11, 2018Updated 7 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- Yet Another Mac Changer!!!☆12Jan 26, 2023Updated 3 years ago