Sub-Domain TakeOver Vulnerability Scanner (edoardottt fork)
☆81Jan 29, 2025Updated last year
Alternatives and similar repositories for takeover
Users that are interested in takeover are comparing it to the libraries listed below
Sorting:
- My experiments in weaponizing ONOS applications (https://github.com/opennetworkinglab/onos)☆20Nov 10, 2024Updated last year
- [experiment] Generate Nuclei templates for CVEs using chatGPT☆20Nov 10, 2024Updated last year
- Golang module exporting general purpose functions I get tired of rewriting every time☆23Nov 10, 2024Updated last year
- Useful material for learning Python, start coding and learn how to logically solve real world problems.☆27Nov 10, 2024Updated last year
- Extract domain from SSL Information☆15Nov 23, 2021Updated 4 years ago
- A collection of hacks and one-off scripts☆18Jun 4, 2021Updated 4 years ago
- random scripts☆17Nov 10, 2024Updated last year
- Tool to find stored robots.txt files from the past☆19Jun 4, 2023Updated 2 years ago
- URL / IP / Email defanging with Golang. Make IoC harmless.☆20Sep 9, 2025Updated 5 months ago
- Are you looking for a word in many pdf files? Do it one time. ⚡☆18Nov 10, 2024Updated last year
- My useful files for penetration tests, security assessments, bug bounty and other security related stuff☆198Updated this week
- A tool for extracting and filtering URLs, IPs, domains, and subdomains from text or web pages, with built-in web scraping capabilities.☆14Mar 10, 2025Updated 11 months ago
- Estimate how long it takes to read a text☆12Sep 6, 2025Updated 5 months ago
- Reads in a list of domains or subdomains and crawls them for references to S3 buckets☆10Nov 21, 2023Updated 2 years ago
- Weekly updated list of missing CVEs in nuclei templates official repository. Mainly built for bug bounty, but useful for penetration test…☆427Feb 23, 2026Updated last week
- This repository presents a proof-of-concept of CVE-2023-22527☆12Jan 23, 2024Updated 2 years ago
- Open Redirect Vulnerability Payload List☆10Feb 23, 2021Updated 5 years ago
- List of bug bounty programs of companies/organisations in Switzerland☆13Oct 28, 2021Updated 4 years ago
- Js File Scanner☆11Mar 30, 2021Updated 4 years ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆57Nov 10, 2024Updated last year
- Implementations of various problems using Python. Dynamic Programming, BackTracking & Sorting algorithms☆26Nov 10, 2024Updated last year
- ☆10Apr 2, 2022Updated 3 years ago
- Easy implementation of some postgreSQL Databases for practicing with Conceptual analysis of requirements, design of relational databases …☆11Nov 10, 2024Updated last year
- Simple C file decrypter☆12Nov 10, 2024Updated last year
- A Golang module to resolve multiple DNS requests concurrently while respecting a rate limit on the resolvers.☆12May 26, 2021Updated 4 years ago
- Tool for Reconnaissance on a web camera.☆18Apr 5, 2022Updated 3 years ago
- ☆18Sep 24, 2024Updated last year
- ☆11Jan 28, 2021Updated 5 years ago
- Evildork targeting your fiancee👁️☆92Jul 30, 2023Updated 2 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆37Feb 14, 2026Updated 2 weeks ago
- 🏴☠️ tools (py3 version) of Black Hat Python book 🏴☠️☆125Nov 10, 2024Updated last year
- Generate customized Password/Passphrase wordlist based on target information☆97Updated this week
- Automatic SQL injector web-forum based CMS☆14Jan 2, 2022Updated 4 years ago
- A simple bash script for Web Cache Deception exploitation.☆16Oct 7, 2024Updated last year
- A slick, modern, privacy-focused web interface for viewing and analyzing Nuclei scan results. Built for pentesters & bug hunters who want…☆27Mar 31, 2025Updated 11 months ago
- Compilation of commands for hacking tasks and security tools as a bit of everything☆14Jul 3, 2025Updated 8 months ago
- Little Bug Bounty & Hacking Tools⚔️☆370Nov 10, 2024Updated last year
- Automate Recon XSS Bug Bounty☆178Updated this week
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆39May 5, 2024Updated last year