ahmedhamdy0x / subExtremeLinks
subExtreme is a subdomain discovery tool written in Rust, designed to perform brute-force attacks to discover subdomains.
☆13Updated 2 months ago
Alternatives and similar repositories for subExtreme
Users that are interested in subExtreme are comparing it to the libraries listed below
Sorting:
- An enhanced OWASP Testing Guide v4.2 with tips, tricks, and new vulnerabilities not in the OWASP list. Features modular testing, actionab…☆87Updated 9 months ago
- Cross-Site Scripting (XSS) injects malicious scripts into trusted websites via user input. Attacker-sent scripts run in users' browsers, …☆62Updated 2 years ago
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆260Updated 6 months ago
- ☆19Updated last year
- ☆85Updated 2 months ago
- A quick bug bounty guide for beginners☆86Updated 7 months ago
- ☆15Updated 2 years ago
- ☆14Updated 9 months ago
- ☆510Updated last month
- This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter☆35Updated last year
- To use hackJS, specify a target URL that contains JavaScript files you want to analyze. The tool will fetch these JavaScript files, extra…☆19Updated 5 months ago
- ☆60Updated 4 months ago
- ☆447Updated 3 months ago
- ☆218Updated last month
- ☆46Updated last year
- ☆134Updated 10 months ago
- A modern tool written in Python that automates your xss findings.☆464Updated 2 years ago
- This repo contains Machines and Notes for practicing for EJPTv1/2 exam☆137Updated last year
- This repo contains Machines and Notes for practicing for EJPTv1/2 exam☆17Updated 2 years ago
- Here you can find mostly all disclosed h1 reports☆28Updated 3 years ago
- BadGPT is a robust framework designed to simplify and optimize the bug bounty process. Equipped with a suite of tools for reconnaissance,…☆22Updated last year
- A comprehensive bug bounty methodology compiled from extensive research, covering web application reconnaissance, checklists, and methods…☆108Updated last year
- ☆18Updated 4 months ago
- Collection of Penetration Testing Interview Questions across various domains, including Information Security, Network Security, Web Secur…☆52Updated 3 months ago
- ☆143Updated 10 months ago
- Bug Bounty Hunting Framework Designed to Help Beginners Compete w/ the Pros☆401Updated last week
- This repo contains Machines and Notes for practicing for eCPPTv2 exam☆65Updated last year
- ☆20Updated 2 months ago
- ☆153Updated 9 months ago
- Bug Bounty Tools used on Twitch - Recon☆317Updated last year