subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.
☆28Jan 29, 2024Updated 2 years ago
Alternatives and similar repositories for subBruter
Users that are interested in subBruter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated 2 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆28Nov 11, 2020Updated 5 years ago
- A micro-framework and tool for performing reconnaissance.☆40Jan 15, 2026Updated 3 months ago
- Proof of Concept OSINT visualization☆12Dec 29, 2017Updated 8 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Aug 31, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A comprehensive automation script for penetration testing and reconnaissance.☆43Jul 29, 2024Updated last year
- 🕵️ Email osint tool☆65Aug 23, 2023Updated 2 years ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆32Jun 2, 2024Updated last year
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆75Jan 6, 2026Updated 3 months ago
- Script en bash de Nmap que se puede personalizar para ajustar el escaneo a tus necesidades.☆13Jul 20, 2024Updated last year
- ☆54May 18, 2024Updated last year
- Car Hacking Toolkit☆13Oct 15, 2021Updated 4 years ago
- A simple bug bounty utility tool to remove uninteresting entries from a list of URLs.☆13Jul 22, 2024Updated last year
- A comprehensive WiFi penetration testing framework for security professionals☆17Jul 18, 2025Updated 8 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- OSINT datatabase (France / Internationale)☆36Mar 18, 2026Updated 3 weeks ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated last year
- Clipboard poisoning attack.☆58Jun 22, 2020Updated 5 years ago
- Fetch information about a public Google document.☆13Aug 4, 2023Updated 2 years ago
- Proof of Concept Exploit for CVE-2024-9464☆45Oct 9, 2024Updated last year
- Pentest Checklists☆21Aug 23, 2020Updated 5 years ago
- This is a tool for pentesters which scan for VLANs on a network link.☆17May 12, 2015Updated 10 years ago
- A command-line utility for performing reverse DNS lookups☆72Aug 10, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆62Sep 27, 2023Updated 2 years ago
- Buffer Overflow para SLmail5.5 32 bits☆17Dec 5, 2021Updated 4 years ago
- ☆38Apr 5, 2024Updated 2 years ago
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser au…☆92Nov 26, 2024Updated last year
- JScripter is a Python script designed to scrape and save unique JavaScript files from a list of URLs or a single URL.☆29Nov 26, 2024Updated last year
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Jun 5, 2024Updated last year
- Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit☆18Jun 3, 2024Updated last year
- All-in Fuzzer. Burp suite extension for auto fuzzing params, headers, body☆36Apr 9, 2026Updated last week
- Elasticsearch Stack Overflow Vulnerability☆18Sep 23, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆40Apr 1, 2025Updated last year
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆50Nov 5, 2025Updated 5 months ago
- ☆23Jun 28, 2025Updated 9 months ago
- Stop Microsoft 365 configuration drift before it becomes a breach☆84Mar 11, 2026Updated last month
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆400Jul 23, 2025Updated 8 months ago
- Detection for CVE-2025-61882 & CVE-2025-61884☆36Oct 14, 2025Updated 6 months ago
- ARP Poisoning Tool, it creates entries on target's ARP Table. The things which you need only are Destination IP and MAC address.☆48Jan 17, 2020Updated 6 years ago