edoardottt / takeover
Sub-Domain TakeOver Vulnerability Scanner (edoardottt fork)
☆51Updated 3 weeks ago
Alternatives and similar repositories for takeover:
Users that are interested in takeover are comparing it to the libraries listed below
- Host Header Vulnerability Scanner Automated Tool☆23Updated last year
- xsschecker tool checking reflected endpoints finding possible xss vulnerable endpoints.☆21Updated 3 months ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆32Updated last year
- Filter URLs to save your time.☆59Updated 2 years ago
- Nuclei Templates☆18Updated 4 months ago
- Tools and methods that I personally use for Recon and Exploitations☆33Updated last month
- A collection of automation scripts for bug bounty hunting.☆29Updated 2 years ago
- I collected it to help the bug hunter get a reward☆57Updated 2 years ago
- Describe how to use ffuf different options with examples☆84Updated 2 years ago
- RobinHood - Bug Hunting Recon Automation Script☆33Updated 2 years ago
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆31Updated last year
- This tool allows you to find ssti vulnerability with ease!☆20Updated 2 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 3 years ago
- This script will find some basic vulns. I made this script for my daily hunting. The best feature about this script is just run it in bac…☆18Updated last year
- Fast Bug Bounty Script☆36Updated last month
- Web Crawler for Identifying Entry Points☆11Updated 10 months ago
- This script reads a text file containing domains, fetches the subdomains from crt.sh☆10Updated last year
- Here Are Some Bug Bounty Resource From Twitter☆87Updated 3 weeks ago
- Learn how to automate XSS, SSRF, LFI, SQLI, NoSQLi☆40Updated 3 years ago
- These Repositories About My Recon Methodology To Give Some Idea For Other Hunter How To Do Recon☆44Updated 2 years ago
- ☆21Updated 2 years ago
- A tool that automates the search for IDOR vulnerabilities in web apps and APIs☆53Updated 4 years ago
- ShoLister is a tool that collects all available subdomains for specific hostname or organization from Shodan. The tool is designed to be …☆58Updated 2 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆39Updated 2 years ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆31Updated 8 months ago
- Inside403 is a powerful and versatile web security testing tool designed to assess the robustness of web pages and directories against 40…☆30Updated last year
- ☆76Updated 2 years ago
- Help recon of hostnames from specific ASN or CIDR, thanks to Robtex and BGP.HE☆52Updated 3 months ago
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆35Updated last year