This tool shows the result of crt.sh
☆87Aug 19, 2022Updated 3 years ago
Alternatives and similar repositories for crtsh
Users that are interested in crtsh are comparing it to the libraries listed below
Sorting:
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- CLI tool for discovering related base domains using WhoisXMLAPI's reverse Whois endpoints☆12Jun 15, 2024Updated last year
- Is this IP a C2 server?☆28Apr 21, 2020Updated 5 years ago
- Search for secrets inside user data attached to EC2 instances on multiple AWS accounts☆16Jun 19, 2024Updated last year
- web-based-fuzzer☆32Jun 26, 2020Updated 5 years ago
- IoC's, PCRE's, YARA's etc☆23Mar 25, 2025Updated 11 months ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Dec 2, 2025Updated 3 months ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- ASN target organization IP range attack surface mapping for reconnaissance, fast and lightweight☆220Apr 10, 2022Updated 3 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- Extract most frequent words in a list of subdomains☆12Feb 15, 2025Updated last year
- Python3 Metasploit automation library☆24Dec 8, 2022Updated 3 years ago
- A shortlist of core ServiceNow tables.☆15Oct 16, 2023Updated 2 years ago
- Burp Suite extension to perform Kerberos authentication☆12Jan 19, 2026Updated last month
- all manner of wordlists☆24Jan 19, 2022Updated 4 years ago
- A list of several resources on different areas such as Security, OSINT, etc. This list is composed of tools that I use or have used and i…☆77May 18, 2020Updated 5 years ago
- Implementation of Wappalyzer in Python☆55Dec 8, 2022Updated 3 years ago
- Selenium based web scraper to generate passwords list☆51May 7, 2020Updated 5 years ago
- A collection of captured SSH login credentials☆17Mar 28, 2021Updated 4 years ago
- ApertaCookie is a PowerShell module that can extract and decrypt cookie data from the SQLite databases of several popular browsers.☆13Apr 3, 2022Updated 3 years ago
- A reverse whois tool based on Whoxy API.☆170Mar 31, 2024Updated last year
- Take domains on stdin and output them on stdout if they get resolved☆32May 27, 2022Updated 3 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆93Nov 9, 2018Updated 7 years ago
- Validate proxies for specific domain☆38Aug 14, 2021Updated 4 years ago
- Proof of Concept for Netgear Routerlogin.com exploit☆17Feb 9, 2020Updated 6 years ago
- A program for collecting subdomains of a list of given second-level domains (SLD)☆15Feb 10, 2026Updated 3 weeks ago
- Build scripts of ci.rvperf.org☆12Feb 1, 2026Updated last month
- A small DNS serve that serves records for all the machines in your Tailscale tailnet☆18Sep 18, 2023Updated 2 years ago
- Declutters URLs in a fast and flexible way, for improving input for web hacking automations such as crawlers and vulnerability scans.☆59Jan 22, 2023Updated 3 years ago
- generate reverse shell from CLI for linux and Windows.☆248Sep 17, 2020Updated 5 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Aug 21, 2019Updated 6 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Oct 17, 2013Updated 12 years ago
- A tool to analyse JMX API security level.☆44Jul 23, 2014Updated 11 years ago
- Burp Extension for copying requests safely. It redacts headers like Cookie, Authorization and X-CSRF-Token for now. More support can be a…☆18May 17, 2020Updated 5 years ago
- a JS tool that let you take screenshot of many hosts.☆13Aug 2, 2019Updated 6 years ago
- It is a repository for Red Team emulation based on MITRE ATT&CK.☆16Aug 5, 2019Updated 6 years ago
- Some talks about security☆12Nov 20, 2020Updated 5 years ago
- Keyhack - Golang API token/webhook validator☆16Mar 20, 2025Updated 11 months ago