arg2u / subrutLinks
The super fast tool for brute forcing subdomains
☆26Updated 2 years ago
Alternatives and similar repositories for subrut
Users that are interested in subrut are comparing it to the libraries listed below
Sorting:
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Assorted scripts I made for Red Teaming / Pen Testing☆13Updated last year
- Bash script for CTF automating basic enumeration☆43Updated 3 years ago
- ☆43Updated 2 months ago
- A collection of red blue team staff☆46Updated 2 years ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 2 years ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆33Updated 3 years ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- Check IP addresses against known cloud provider IP address ranges☆45Updated last year
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆54Updated 3 years ago
- Red Team tools, infrastructure, and hardware weaponized☆106Updated last month
- Handy scripts and one-liners to make life easier☆37Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- A network logging tool that logs per process activities☆32Updated 2 years ago
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆19Updated 8 months ago
- Repository and archive for Killing The Bear Gitbook☆83Updated last year
- My journey and notes on learning Offensive Security from the ground up☆19Updated last year
- A BASH Script to automate the installation of the most popular bug bounty tools☆20Updated 9 months ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- ☆34Updated 2 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆52Updated 2 years ago
- This could have been a bash one-liner but guess what. It's a small Go tool that lists the trending CVEs from cvetrends.com☆106Updated 2 years ago
- ☆24Updated 5 months ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆44Updated last year
- ☆38Updated 4 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆43Updated last year
- Do It Yourself! (DIY) Web Penetration Testing is a guideline in performing security test cases against web applications☆39Updated last year
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year