SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.
☆132Jan 28, 2025Updated last year
Alternatives and similar repositories for subsnipe
Users that are interested in subsnipe are comparing it to the libraries listed below
Sorting:
- ☆75Mar 19, 2025Updated last year
- Configurable, Community driven, HTTP C2 Profile☆28Feb 16, 2026Updated last month
- sl0ppy-PrivescTaskCreator.ps1☆40Oct 8, 2025Updated 5 months ago
- Automation tool for Windows Deception Host Burn-In☆86Dec 4, 2024Updated last year
- Exploits Unauth Docker API☆43Apr 18, 2025Updated 11 months ago
- This tool is a simple ffuf launcher which lets you select dynamically which wordlist and which extentions you want to fuzz.☆10Updated this week
- ☆15Apr 10, 2025Updated 11 months ago
- The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful re…☆21Mar 22, 2025Updated last year
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆192Sep 8, 2024Updated last year
- Digging into private data through Sonarcloud public projects☆11Sep 13, 2024Updated last year
- Subdomain Scanner - the most exhaustive tool for sub-domain recognition and mapping to related IPs and ASNs☆18Jul 4, 2025Updated 8 months ago
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- secator - the pentester's swiss knife☆1,249Updated this week
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆74Jun 21, 2024Updated last year
- Aranya user library, daemon, and policy code☆194Updated this week
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Jan 20, 2025Updated last year
- this repo contains some public methodologies which I found from internet (google,telegram,discord,writeups etc..)☆30May 30, 2024Updated last year
- Extract endpoints from source files.☆25Mar 28, 2023Updated 2 years ago
- The Internets #1 Subdomain Takeover Tool☆301Jun 4, 2025Updated 9 months ago
- Filter URLs that match your scope file for bugbounty.☆11May 23, 2023Updated 2 years ago
- Collection of malware analysis, binary exploitation and reverse engineering related resources☆25Mar 5, 2026Updated 2 weeks ago
- POC for CVE-2020-9484☆13Feb 10, 2021Updated 5 years ago
- Subdomains scanner Spider☆13Feb 29, 2024Updated 2 years ago
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆463Mar 28, 2024Updated last year
- PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.☆235Jul 8, 2025Updated 8 months ago
- ☆14Nov 8, 2024Updated last year
- ☆36Jun 21, 2024Updated last year
- ☆18Feb 29, 2024Updated 2 years ago
- Multiplayer pivoting solution☆490Mar 7, 2026Updated 2 weeks ago
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆435Updated this week
- nxdomain subdomain enumeration☆10Jul 17, 2022Updated 3 years ago
- An offensive data enrichment pipeline☆943Mar 10, 2026Updated last week
- unleashed ffuf☆249Oct 29, 2025Updated 4 months ago
- CurlWright is a Cloudflare bypass tool that leverages Playwright to execute curl commands with full browser capabilities, allowing you to…☆33Mar 9, 2026Updated last week
- Make everyone in your VLAN ASRep roastable☆249Oct 7, 2025Updated 5 months ago
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆44Mar 20, 2022Updated 4 years ago
- ProxyWatch☆46Feb 28, 2026Updated 3 weeks ago
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆226Sep 4, 2024Updated last year
- Templates for developing your own listeners and agents for AdaptixC2.☆47Feb 28, 2026Updated 3 weeks ago