Subdomain takeover scanner using Python asyncio
☆18Oct 24, 2022Updated 3 years ago
Alternatives and similar repositories for tekover
Users that are interested in tekover are comparing it to the libraries listed below
Sorting:
- Private vulnerability testing suite☆13Mar 30, 2021Updated 4 years ago
- KARMA is a simple bash script automation that can hit Shodan Premium API and find active IPs, ASN, Common Vulnerabilities, CVEs & Open Po…☆59Sep 6, 2021Updated 4 years ago
- ☆18Apr 7, 2022Updated 3 years ago
- ☆33Jun 27, 2022Updated 3 years ago
- Guide to SSRF☆74Oct 10, 2023Updated 2 years ago
- ☆11Dec 25, 2020Updated 5 years ago
- ☆49Mar 25, 2022Updated 3 years ago
- Ultimate Package Of 50 Bug Bounty Hunting Tools☆47Oct 3, 2025Updated 4 months ago
- all manner of wordlists☆24Jan 19, 2022Updated 4 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- ☆10Jan 30, 2022Updated 4 years ago
- A training course on Web Security, Exploit Development and Source Code Auditing from 2009.☆12Feb 15, 2022Updated 4 years ago
- Exploits for different vulnerabilities☆13Nov 29, 2021Updated 4 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Jun 13, 2020Updated 5 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Feb 6, 2022Updated 4 years ago
- A bash tool used to install famous bug bounty tools. Mainly used when setting up a fresh environment.☆16Mar 20, 2023Updated 2 years ago
- This repo is just a guide where you can find all labs of burp suite resolved, you can see the workflow and all type of web attacks☆14Mar 29, 2022Updated 3 years ago
- a tool that gets all paths at robots.txt and opens it in the browser.☆14Aug 2, 2019Updated 6 years ago
- Scripts/tools to destroy things☆17Sep 13, 2021Updated 4 years ago
- Tools, Resources & Helpful Tips☆14Jul 21, 2022Updated 3 years ago
- Tips For Bug Bounty Hunters☆86Jul 16, 2022Updated 3 years ago
- S3 bucket finder from html,js and bucket misconfiguration testing tool☆34Feb 10, 2020Updated 6 years ago
- gup aka Get All Urls parameters to create wordlists for brute forcing parameters.☆18Dec 4, 2021Updated 4 years ago
- A collection of custom built scripts to exploit known vulnerability chains☆25Jul 23, 2021Updated 4 years ago
- ☆34Jun 23, 2021Updated 4 years ago
- SubzzZ to find possible subdomains using passive recon. Tool also support Permutations, Mutations, Alterations.☆38Mar 7, 2021Updated 4 years ago
- A compilation of network scanning strategies to find vulnerable devices☆73Nov 6, 2022Updated 3 years ago
- Techniques / Tips and tricks for finding sensitive data exposures in Github for Penetration Testers / Bug Bounty Hunters☆17Aug 1, 2020Updated 5 years ago
- ☆45Jun 5, 2021Updated 4 years ago
- Network penetration testing toolset wrapper☆81Jul 5, 2022Updated 3 years ago
- offensive notes & resources☆43Apr 7, 2025Updated 10 months ago
- ☆42Jul 14, 2021Updated 4 years ago
- parse ffuf & map endpoints to wordlists☆21Feb 25, 2021Updated 5 years ago
- My notes from courses,books ..etc☆48Nov 26, 2025Updated 3 months ago
- Command line util for grep.app - Search across a half million git repos☆58Nov 24, 2022Updated 3 years ago
- Nuclei templates for drupal vulns... far from perfect☆17Jan 9, 2025Updated last year
- 31 Tips for pentesters & security engineers☆86Aug 20, 2021Updated 4 years ago
- WaybackURLS + OtxURLS + CommonCrawl = The Best Results☆22Dec 7, 2019Updated 6 years ago
- The scripts I write to help me on my bug bounty hunting☆123Jan 8, 2022Updated 4 years ago