Script that performs a scan of a specific domain, using the following tools: Subfinder, assetfinder, amass and httpx. The result is merged into one file.
☆24Apr 20, 2022Updated 3 years ago
Alternatives and similar repositories for Subscan4
Users that are interested in Subscan4 are comparing it to the libraries listed below
Sorting:
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 3 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 3 years ago
- Development of Botnet Detection Module for Traffic-Based IoT Devices Using Deep Learning☆14Dec 26, 2022Updated 3 years ago
- A fast, powerful open-source password generator with hexagonal architecture. Features a zero-dependency core, Web UI demo, CLI tool, and …☆21Feb 9, 2026Updated 3 weeks ago
- This tool is intended to be used for on target enumeration to gather and exfiltrate information and then to upload tools such as netcat o…☆22Jan 6, 2026Updated last month
- Probe: This is a special tool for bug hunter for automated recon process smoothly.☆24Jan 29, 2024Updated 2 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- mift - a mobile image forensic toolkit☆46Nov 14, 2023Updated 2 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆27Apr 17, 2022Updated 3 years ago
- Updates the Emerging Threats open ruleset for Suricata☆10Sep 20, 2015Updated 10 years ago
- Simple API for storing all incoming XSS requests and various XSS templates.☆48Jul 18, 2024Updated last year
- A script for automatize boolean-based blind SQL injections (MVP).☆54Aug 29, 2022Updated 3 years ago
- Store and retrieve your passwords from a secure offline database. Check if your passwords has leaked previously to prevent targeted passw…☆33Mar 4, 2023Updated 2 years ago
- Subdomain crawler with wordlist using python☆13Mar 22, 2020Updated 5 years ago
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- List of custom Nuclei templates☆16Nov 4, 2023Updated 2 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- Yet another web recon tool☆61Aug 9, 2023Updated 2 years ago
- 📝 Instagram Info Scraper☆14Mar 3, 2021Updated 5 years ago
- ☆15Dec 1, 2021Updated 4 years ago
- Hax is a mini-tool with really useful hacking tools.☆20May 9, 2023Updated 2 years ago
- The script specializes in collecting information about sites, protocols and servers, facilitating work on the Metasploit project and repa…☆13Oct 31, 2018Updated 7 years ago
- Packet sniffer using scapy☆25Mar 21, 2020Updated 5 years ago
- SWS-Recon is a Python Tool designed to performed Reconnaissance on the given target website- Domain or SubDomain. SWS-Recon collects info…☆22Mar 16, 2023Updated 2 years ago
- Perform OSINT on external targets using Shodan☆23Feb 7, 2024Updated 2 years ago
- Nuclei Tamplates for APK☆21Jan 13, 2023Updated 3 years ago
- DragonMS is Tools for ddos, scanner, tracker, payload generator msfvenom and scraping☆78Jan 9, 2022Updated 4 years ago
- A security tool designed to perform thorough scans on a target using OpenVAS, Zap, and Nexpose. It seamlessly consolidates and integrates…☆46Feb 11, 2026Updated 3 weeks ago
- Cross-Site Scripting (XSS) vulnerability analyzer☆21Feb 13, 2026Updated 2 weeks ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 3 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆19Jul 1, 2023Updated 2 years ago
- A tool for steganography of png files .☆24Jul 27, 2022Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆21May 15, 2022Updated 3 years ago
- Pentesting post exploitation tool for slack☆33Nov 15, 2025Updated 3 months ago
- arbitrary TCP and UDP connections and listens (Netcat for Python).☆100Oct 9, 2024Updated last year
- ReconPal: Leveraging NLP for Infosec☆57May 23, 2022Updated 3 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆30Updated this week
- wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]☆57Mar 26, 2022Updated 3 years ago