edoardogerosa / delatorLinks
Golang-based subdomain miner leveraging certificate transparency logs
☆74Updated 2 years ago
Alternatives and similar repositories for delator
Users that are interested in delator are comparing it to the libraries listed below
Sorting:
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- Index all certificates from certificate transparancy into Elasticsearch☆22Updated 8 years ago
- Burp Commander written in Go☆57Updated 6 years ago
- S3 bucket enumerator☆44Updated 8 years ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 3 years ago
- Drupal Honeypot☆58Updated 6 years ago
- Scout - a Contactless Active Reconnaissance Tool☆56Updated 3 years ago
- Mass scanning the internet (http and https) using a raw tcpstack.☆58Updated 8 years ago
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆61Updated 3 years ago
- Scans a list of websites for Cloudfront or S3 Buckets☆106Updated last month
- Utility for annotating Internet datasets with contextual metadata (e.g., origin AS, MaxMind GeoIP2, reverse DNS, and WHOIS)☆107Updated last week
- ☆25Updated 4 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆93Updated 7 years ago
- Simple golang shodan cli☆49Updated 4 years ago
- A program to map out SPF and DKIM records for a large number of domains☆39Updated 10 years ago
- Quickly fetch Let's Encrypt certs and serve a reverse proxy☆105Updated 3 years ago
- A sub-domain reconnaissance written in golang☆12Updated 7 years ago
- Trivial unixey pentest utilities☆57Updated last year
- JIRA Secure Attachment Looter☆70Updated 5 years ago
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆182Updated 3 years ago
- Hunt Open MongoDB instances☆79Updated 6 years ago
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.☆49Updated 6 years ago
- ❄️ Research project for SubFinder core API V2☆34Updated 6 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆114Updated 6 years ago
- extracts urls from text☆16Updated 7 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 6 years ago
- Scan for and exploit Consul agents☆39Updated 6 years ago
- A Report Generation Tool for Security Assessment☆65Updated 6 years ago
- Amazon S3 bucket spelunking!☆87Updated 8 years ago