arg2u / subrutLinks
The super fast tool for brute forcing subdomains
☆27Updated 3 years ago
Alternatives and similar repositories for subrut
Users that are interested in subrut are comparing it to the libraries listed below
Sorting:
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 3 years ago
- Enhance your malware detection with WAF + YARA (WAFARAY)☆108Updated 3 years ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆69Updated 4 years ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆54Updated 3 years ago
- Just another vulnerable web application.☆36Updated last year
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆34Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- My journey and notes on learning Offensive Security from the ground up☆21Updated last month
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆124Updated last month
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Updated last year
- masscan with exclusive excludes☆58Updated 2 years ago
- The DNS Hunt will make your life easier, and of course faster.☆47Updated 5 years ago
- Handy scripts and one-liners to make life easier☆36Updated 2 years ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year
- Bash script for CTF automating basic enumeration☆42Updated 3 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆30Updated last year
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆32Updated 2 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated last year
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 3 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆44Updated 2 years ago
- ReconPal: Leveraging NLP for Infosec☆57Updated 3 years ago
- ☆43Updated 9 months ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Updated 2 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆24Updated 8 months ago
- Do It Yourself! (DIY) Web Penetration Testing is a guideline in performing security test cases against web applications☆39Updated 2 years ago
- Google Meet Phishing Template For Gophish☆48Updated 3 years ago
- Red Team tools, infrastructure, and hardware weaponized☆109Updated last month