ahmedhamdy0x / subExtreme
subExtreme is a subdomain discovery tool written in Rust, designed to perform brute-force attacks to discover subdomains.
☆11Updated 4 months ago
Alternatives and similar repositories for subExtreme:
Users that are interested in subExtreme are comparing it to the libraries listed below
- ☆14Updated last month
- An enhanced OWASP Testing Guide v4.2 with tips, tricks, and new vulnerabilities not in the OWASP list. Features modular testing, actionab…☆75Updated 2 months ago
- ☆15Updated last year
- ☆19Updated last year
- This repo contains Machines and Notes for practicing for EJPTv1/2 exam☆15Updated last year
- This repo contains Machines and Notes for practicing for EJPTv1/2 exam☆121Updated last year
- To use hackJS, specify a target URL that contains JavaScript files you want to analyze. The tool will fetch these JavaScript files, extra…☆16Updated 3 weeks ago
- www.sec-down.com☆18Updated 3 years ago
- ☆27Updated 2 years ago
- ☆48Updated 7 months ago
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆107Updated 3 months ago
- This repo contains Machines and Notes for practicing for eCPPTv2 exam☆58Updated last year
- Scripts for solving WebSecurity Academy labs of PortSwigger using Python☆77Updated last year
- ☆184Updated last year
- Here you can find mostly all disclosed h1 reports☆25Updated 3 years ago
- Bug Bounty Hunting Framework Designed to Help Beginners Compete w/ the Pros☆90Updated this week
- A premier resource for pentesting professionals and enthusiasts. Explore top-tier tutorials, tools, and guides designed to sharpen your s…☆9Updated last year
- ☆10Updated 3 months ago
- CORSER is a Golang CLI Application for Advanced CORS Misconfiguration Detection☆56Updated 5 months ago
- ☆275Updated last week
- Collection of Penetration Testing Interview Questions across various domains, including Information Security, Network Security, Web Secur…☆42Updated 6 months ago
- ☆20Updated 7 months ago
- This course uses a deliberately vulnerable banking application to demonstrate common security vulnerabilities, their impact, and how to f…☆48Updated 2 months ago
- ☆52Updated 10 months ago
- ☆103Updated 2 months ago
- My Private Bug Hunting Methodology☆284Updated 4 months ago
- ☆61Updated this week
- ☆142Updated 3 months ago
- Bug Bounty Platforms☆24Updated 6 months ago
- A resources for who want to learn and get deep into client-side bugs☆29Updated 4 months ago