chris408 / ct-exposerView external linksLinks
An OSINT tool that discovers sub-domains by searching Certificate Transparency logs
☆481Aug 16, 2022Updated 3 years ago
Alternatives and similar repositories for ct-exposer
Users that are interested in ct-exposer are comparing it to the libraries listed below
Sorting:
- Drupal enumeration & exploitation tool☆616Nov 4, 2020Updated 5 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆401May 20, 2020Updated 5 years ago
- Extracting URLs of a specific target based on the results of "commoncrawl.org"☆275Dec 4, 2025Updated 2 months ago
- This repository contains all the material from the talk "Esoteric sub-domain enumeration techniques" given at Bugcrowd LevelUp 2017 virtu…☆632Feb 5, 2019Updated 7 years ago
- Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain name…☆1,644Jun 6, 2024Updated last year
- Extract subdomains from SSL certificates in HTTPS sites.☆388Mar 3, 2025Updated 11 months ago
- This tool can be used to brute discover GET and POST parameters☆1,390Aug 24, 2019Updated 6 years ago
- Scrape/Parse Pastebin using GO and expression grammar (PEG)☆96Dec 10, 2024Updated last year
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆424Jan 16, 2026Updated 3 weeks ago
- ☆18Sep 22, 2018Updated 7 years ago
- A Comprehensive Web Fuzzer and Content Discovery Tool☆553Jul 21, 2023Updated 2 years ago
- Phishing on Twitter☆251Jun 21, 2018Updated 7 years ago
- Bash post exploitation toolkit☆744Jul 19, 2023Updated 2 years ago
- This repository contains all the supplement material for the book "The art of sub-domain enumeration"☆662Jan 30, 2019Updated 7 years ago
- CloudBunny is a tool to capture the real IP of the server that uses a WAF as a proxy or protection. In this tool we used three search eng…☆376Feb 4, 2024Updated 2 years ago
- A Tool for Domain Flyovers☆5,896May 22, 2022Updated 3 years ago
- Linux Privilege Escalation Tool☆186Apr 12, 2019Updated 6 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆538Mar 27, 2022Updated 3 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- Darknet Osint Graph Explorer☆126Oct 7, 2020Updated 5 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- Multi Tool Subdomain Enumeration☆724Apr 11, 2021Updated 4 years ago
- Active Directory Assessment and Privilege Escalation Script☆1,130Dec 7, 2022Updated 3 years ago
- A Powerful Subdomain Takeover Tool☆962Oct 17, 2023Updated 2 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- A powerful target reconnaissance framework powered by graph theory.☆418Oct 21, 2022Updated 3 years ago
- The Traditional Swiss Army Knife for OSINT☆558Jun 10, 2021Updated 4 years ago
- Robber is open source tool for finding executables prone to DLL hijacking☆785Jun 23, 2022Updated 3 years ago
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆470Nov 14, 2019Updated 6 years ago
- A vulnerable LDAP based web app written in Golang☆83Oct 31, 2023Updated 2 years ago
- A tool to generate media files with malicious metadata☆129Feb 2, 2019Updated 7 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,131Feb 10, 2021Updated 5 years ago
- JShell - Get a JavaScript shell with XSS.☆532May 5, 2019Updated 6 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆654Jan 6, 2022Updated 4 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Feb 11, 2020Updated 6 years ago
- Proof of concept showing how to exploit the CVE-2018-11759☆40Dec 11, 2018Updated 7 years ago
- A framework for wireless pentesting.☆1,228Oct 14, 2020Updated 5 years ago