Sub-Domain TakeOver Vulnerability Scanner (edoardottt fork)
☆81Jan 29, 2025Updated last year
Alternatives and similar repositories for takeover
Users that are interested in takeover are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- My experiments in weaponizing ONOS applications (https://github.com/opennetworkinglab/onos)☆20Nov 10, 2024Updated last year
- Golang module exporting general purpose functions I get tired of rewriting every time☆23Nov 10, 2024Updated last year
- Useful material for learning Python, start coding and learn how to logically solve real world problems.☆27Nov 10, 2024Updated last year
- [experiment] Generate Nuclei templates for CVEs using chatGPT☆20Nov 10, 2024Updated last year
- random scripts☆17Nov 10, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A collection of hacks and one-off scripts☆18Jun 4, 2021Updated 4 years ago
- Extract domain from SSL Information☆15Nov 23, 2021Updated 4 years ago
- URL / IP / Email defanging with Golang. Make IoC harmless.☆20Sep 9, 2025Updated 6 months ago
- Gitosint is a tool for reconnaissance of the Git services and extracting valuable metadata from commits.☆14Aug 22, 2021Updated 4 years ago
- Weekly updated list of missing CVEs in nuclei templates official repository. Mainly built for bug bounty, but useful for penetration test…☆427Mar 16, 2026Updated last week
- Estimate how long it takes to read a text☆12Sep 6, 2025Updated 6 months ago
- My useful files for penetration tests, security assessments, bug bounty and other security related stuff☆200Updated this week
- Tool to find stored robots.txt files from the past☆19Jun 4, 2023Updated 2 years ago
- List of bug bounty programs of companies/organisations in Switzerland☆13Oct 28, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Reads in a list of domains or subdomains and crawls them for references to S3 buckets☆10Nov 21, 2023Updated 2 years ago
- Easy implementation of some postgreSQL Databases for practicing with Conceptual analysis of requirements, design of relational databases …☆11Nov 10, 2024Updated last year
- Automate Recon XSS Bug Bounty☆182Mar 9, 2026Updated 2 weeks ago
- <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html><html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en" xml:lang="en" class=…☆10Jun 13, 2017Updated 8 years ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆57Nov 10, 2024Updated last year
- Find endpoints in archived versions of robots.txt☆14Nov 21, 2019Updated 6 years ago
- A simple bash script for Web Cache Deception exploitation.☆16Oct 7, 2024Updated last year
- Are you looking for a word in many pdf files? Do it one time. ⚡☆18Nov 10, 2024Updated last year
- Simple C file decrypter☆12Nov 10, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Advanced CORS Header Checker Tool with Vulnerability Detection and Bypass Attempts☆68Jun 6, 2025Updated 9 months ago
- A Golang module to resolve multiple DNS requests concurrently while respecting a rate limit on the resolvers.☆12May 26, 2021Updated 4 years ago
- ☆10Apr 2, 2022Updated 3 years ago
- HackerRank-Python 🐍☆14Nov 10, 2024Updated last year
- Awesome Pentest Reports☆19Jun 16, 2023Updated 2 years ago
- Little Bug Bounty & Hacking Tools⚔️☆372Mar 16, 2026Updated last week
- Evildork targeting your fiancee👁️☆92Jul 30, 2023Updated 2 years ago
- Implementations of various problems using Python. Dynamic Programming, BackTracking & Sorting algorithms☆26Nov 10, 2024Updated last year
- A quick and dirty script to bypass SSL pinning of Flutter applications☆69Mar 3, 2026Updated 3 weeks ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Generate customized Password/Passphrase wordlist based on target information☆97Feb 27, 2026Updated 3 weeks ago
- This repository presents a proof-of-concept of CVE-2023-22527☆12Jan 23, 2024Updated 2 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 5 years ago
- Open Redirect Vulnerability Payload List☆10Feb 23, 2021Updated 5 years ago
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆39May 5, 2024Updated last year
- Tmux configuration, that supercharges your tmux to build cozy and cool terminal environment☆14Dec 24, 2019Updated 6 years ago
- A web application attack surface mapping tool. It takes in a list of urls then performs numerous probes☆15Aug 4, 2022Updated 3 years ago