edoardottt / takeover
Sub-Domain TakeOver Vulnerability Scanner (edoardottt fork)
☆51Updated 2 months ago
Alternatives and similar repositories for takeover:
Users that are interested in takeover are comparing it to the libraries listed below
- This script will find some basic vulns. I made this script for my daily hunting. The best feature about this script is just run it in bac…☆18Updated last year
- This tool allows you to find ssti vulnerability with ease!☆19Updated 2 years ago
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆30Updated last year
- Bug Bounty Recon Automation Script -- Scan AWS IP Range Certs for Matching FQDN☆25Updated 3 years ago
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆35Updated last year
- Tools and methods that I personally use for Recon and Exploitations☆37Updated last month
- xsschecker tool checking reflected endpoints finding possible xss vulnerable endpoints.☆21Updated 4 months ago
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆61Updated last month
- Here Are Some Bug Bounty Resource From Twitter☆89Updated 2 months ago
- Host Header Vulnerability Scanner Automated Tool☆22Updated last year
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆92Updated 8 months ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆58Updated 4 months ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆34Updated last year
- Fast Bug Bounty Script☆37Updated 2 months ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 3 years ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆31Updated 9 months ago
- Dons Js Scanner is a sleek command-line tool that hunts for hidden treasures—API keys, credentials, and secrets—lurking in the JavaScript…☆80Updated 3 weeks ago
- Collection of some pentesting and bugbounty resources☆43Updated 3 years ago
- Web Crawler for Identifying Entry Points☆11Updated last year
- This tool is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner, created by JayCyberSecurity☆23Updated 2 years ago
- Dive into a handpicked selection of tools, guides, and tips tailored for beginners in Bug Bounty and Penetration Testing. 🐛🛡️☆30Updated 7 months ago
- Passive Web Vulnerability Detection Tool☆31Updated 2 months ago
- ☆57Updated last month
- regex Hunter- Fast website endpoint sensitive data and Leaks JS files endpoint API Key Scraper☆10Updated 9 months ago
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆26Updated 3 months ago
- A simple plugin to export JS files from one or multiple targets☆40Updated last year
- A standalone collection of widely used technologies with default credentials enabled, which can be utilized for establishing an initial f…☆18Updated 9 months ago
- ☆34Updated 3 months ago
- A passive way to find backups/ sensitive information.☆72Updated 2 months ago
- This Python script automates the process of identifying vulnerabilities in Firebase configurations extracted from APK files.☆18Updated 2 weeks ago