edoardottt / takeover
Sub-Domain TakeOver Vulnerability Scanner (edoardottt fork)
☆47Updated last month
Alternatives and similar repositories for takeover:
Users that are interested in takeover are comparing it to the libraries listed below
- This tool allows you to find ssti vulnerability with ease!☆20Updated 2 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆31Updated last year
- Filter URLs to save your time.☆59Updated 2 years ago
- ☆28Updated 3 months ago
- xsschecker tool checking reflected endpoints finding possible xss vulnerable endpoints.☆21Updated 2 months ago
- A collection of automation scripts for bug bounty hunting.☆29Updated last year
- Host Header Vulnerability Scanner Automated Tool☆23Updated last year
- Tools and methods that I personally use for Recon and Exploitations☆27Updated last week
- This is a Kind of Dictionary which contains all kinds of Web Application and Network Security Vulnerabilities and other security concepts…☆24Updated 5 months ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 2 years ago
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆23Updated last year
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆35Updated last year
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆30Updated 7 months ago
- Web Crawler for Identifying Entry Points☆11Updated 9 months ago
- ☆43Updated last year
- Inside403 is a powerful and versatile web security testing tool designed to assess the robustness of web pages and directories against 40…☆30Updated last year
- This tool is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner, created by JayCyberSecurity☆23Updated 2 years ago
- This script will find some basic vulns. I made this script for my daily hunting. The best feature about this script is just run it in bac…☆18Updated 11 months ago
- A tool for Subdomain takeovers detection☆26Updated 2 years ago
- Check if domain has bug bounty program or not☆29Updated last year
- "🔍 Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results sto…☆22Updated 11 months ago
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆36Updated 3 weeks ago
- JIRA"YA is a vulnerability analyzer for JIRA instances. It runs active scans to identify vulnerabilities by interacting with the host and…☆33Updated 4 months ago
- A tool that automates the search for IDOR vulnerabilities in web apps and APIs☆52Updated 4 years ago
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆30Updated last year
- Fast subdomains enumeration tool for penetration testers and bug bounty hunters☆22Updated last month
- These Repositories About My Recon Methodology To Give Some Idea For Other Hunter How To Do Recon☆44Updated 2 years ago
- Bug Bounty Recon Automation Script -- Scan AWS IP Range Certs for Matching FQDN☆24Updated 3 years ago
- I collected it to help the bug hunter get a reward☆57Updated 2 years ago