Sub-Domain TakeOver Vulnerability Scanner (edoardottt fork)
☆89Jan 29, 2025Updated last year
Alternatives and similar repositories for takeover
Users that are interested in takeover are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- My experiments in weaponizing ONOS applications (https://github.com/opennetworkinglab/onos)☆20Nov 10, 2024Updated last year
- A tool for extracting and filtering URLs, IPs, domains, and subdomains from text or web pages, with built-in web scraping capabilities.☆18Apr 27, 2026Updated last week
- Golang module exporting general purpose functions I get tired of rewriting every time☆24Nov 10, 2024Updated last year
- Useful material for learning Python, start coding and learn how to logically solve real world problems.☆27Nov 10, 2024Updated last year
- [experiment] Generate Nuclei templates for CVEs using chatGPT☆20Nov 10, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- random scripts☆17Nov 10, 2024Updated last year
- A collection of hacks and one-off scripts☆18Jun 4, 2021Updated 4 years ago
- Extract domain from SSL Information☆15Nov 23, 2021Updated 4 years ago
- Gitosint is a tool for reconnaissance of the Git services and extracting valuable metadata from commits.☆14Aug 22, 2021Updated 4 years ago
- Estimate how long it takes to read a text☆12Sep 6, 2025Updated 7 months ago
- Weekly updated list of missing CVEs in nuclei templates official repository. Mainly built for bug bounty, but useful for penetration test…☆432Apr 27, 2026Updated last week
- My useful files for penetration tests, security assessments, bug bounty and other security related stuff☆204Updated this week
- Tool to find stored robots.txt files from the past☆19Jun 4, 2023Updated 2 years ago
- Reads in a list of domains or subdomains and crawls them for references to S3 buckets☆10Nov 21, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Easy implementation of some postgreSQL Databases for practicing with Conceptual analysis of requirements, design of relational databases …☆11Nov 10, 2024Updated last year
- Automate Recon XSS Bug Bounty☆183Mar 9, 2026Updated last month
- <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html><html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en" xml:lang="en" class=…☆11Jun 13, 2017Updated 8 years ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆57Nov 10, 2024Updated last year
- Find endpoints in archived versions of robots.txt☆14Nov 21, 2019Updated 6 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆39Feb 14, 2026Updated 2 months ago
- A simple bash script for Web Cache Deception exploitation.☆16Oct 7, 2024Updated last year
- Are you looking for a word in many pdf files? Do it one time. ⚡☆18Nov 10, 2024Updated last year
- Simple C file decrypter☆12Nov 10, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A Golang module to resolve multiple DNS requests concurrently while respecting a rate limit on the resolvers.☆12May 26, 2021Updated 4 years ago
- ☆10Apr 2, 2022Updated 4 years ago
- Advanced CORS Header Checker Tool with Vulnerability Detection and Bypass Attempts☆68Apr 23, 2026Updated last week
- 🏴☠️ tools (py3 version) of Black Hat Python book 🏴☠️☆126Nov 10, 2024Updated last year
- HackerRank-Python 🐍☆14Nov 10, 2024Updated last year
- Little Bug Bounty & Hacking Tools⚔️☆376Mar 30, 2026Updated last month
- Implementations of various problems using Python. Dynamic Programming, BackTracking & Sorting algorithms☆26Nov 10, 2024Updated last year
- Evildork targeting your fiancee👁️☆94Jul 30, 2023Updated 2 years ago
- This repository presents a proof-of-concept of CVE-2023-22527☆14Jan 23, 2024Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 5 years ago
- Open Redirect Vulnerability Payload List☆10Feb 23, 2021Updated 5 years ago
- Generate customized Password/Passphrase wordlist based on target information☆104Feb 27, 2026Updated 2 months ago
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆39May 5, 2024Updated 2 years ago
- Tmux configuration, that supercharges your tmux to build cozy and cool terminal environment☆14Dec 24, 2019Updated 6 years ago
- A web application attack surface mapping tool. It takes in a list of urls then performs numerous probes☆15Aug 4, 2022Updated 3 years ago
- Compilation of commands for hacking tasks and security tools as a bit of everything☆15Apr 23, 2026Updated last week