blackhatethicalhacking / bf_active_sub
Subdomain Bruteforce - Bounty Quick Code
☆30Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for bf_active_sub
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆37Updated 2 months ago
- This bash script tool, will perform advanced subdomain enumeration, save the results, it will then probe the subdomains into urls, save t…☆24Updated 2 months ago
- Seamlessly Detect and Construct Exploit POCs for ClickJacking Vulnerability using this Automated tool☆36Updated 3 months ago
- This script will install all the essential bug bounty tools and will find some basic vulns. I made this script for my daily hunting. The …☆38Updated 2 years ago
- ☆27Updated 2 years ago
- Simple Bash Script For Collecting Wordpress Username☆22Updated 3 years ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆48Updated 8 months ago
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆38Updated 2 months ago
- Herramienta de ingeniería social (Creador de puerta trasera con Reverse Shell para Windows/Android) con Ngrok.☆62Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- #xss #xssfinder #xss-scanner #bugbounty #hacktool☆38Updated 10 months ago
- ScopeHunter is a command-line tool for finding in scope targets for bug bounty programs.☆60Updated 2 months ago
- ☆70Updated last year
- This tool will resolve a list of Domains, IPs, Hosts, URLs and save the results for valid/invalid fast!☆14Updated 2 years ago
- An OSINT focused tool made with Nodejs!☆90Updated 2 years ago
- An OSINT tool to search for accounts by username in social networks.☆16Updated 2 years ago
- Hit valid URL☆22Updated 2 years ago
- BUG HUNTING/WEB APPLICATION PENTESTING CHECKLIST☆16Updated last year
- Who We Are☆16Updated 2 months ago
- Find secrets and passwords in container images and file systems☆11Updated 2 years ago
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆20Updated 3 years ago
- Ded Security Framework is a tool aimed at security professionals☆32Updated 6 months ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆35Updated last year
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆17Updated 3 years ago
- Sub-Domain TakeOver Vulnerability Scanner (edoardottt fork)☆35Updated last week
- This is a simple web application vulnerability scanner that checks if a given URL or IP address is vulnerable to 37 common web applicatio…☆21Updated last year
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆69Updated 2 months ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆21Updated last year