gokulapap / submax
All in one subdomain Enumeration tool
☆21Updated 2 years ago
Alternatives and similar repositories for submax:
Users that are interested in submax are comparing it to the libraries listed below
- Automate bug bounty recon using bash alias☆14Updated 9 months ago
- A simple CLI tool to check WebDAV vulnerability☆14Updated 3 years ago
- Automate your subdomain enumeration, subdomain takeover, management, nuclei, etc. in one go.☆10Updated 2 years ago
- Generating Sub-Sub-Subdomain + validating all of them☆10Updated 2 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆9Updated 4 years ago
- Find CVEs that don't have a Detectify modules.☆21Updated 2 years ago
- Blind spot is a python tool for blind injection vulnerabilities , SQLi time based , Command injection , code injection , SSTI☆27Updated 4 years ago
- ☆21Updated 4 years ago
- ☆15Updated last year
- ☆13Updated last year
- A set of tools, procedures, and playbooks for performing bug bounties☆15Updated 6 years ago
- ☆15Updated last year
- Multithreaded Host Header Redirection Scanner☆13Updated 4 years ago
- JsValidator is a tool created for validating the JS files after crawlling it from waybackurls☆19Updated 2 years ago
- ☆21Updated 2 years ago
- This tool is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner, created by JayCyberSecurity☆23Updated 3 years ago
- ☆21Updated 2 years ago
- Check if domain has bug bounty program or not☆27Updated last year
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Updated 11 months ago
- Extract endpoints from source files.☆22Updated 2 years ago
- A solid recon tool I use personally.☆30Updated last year
- ☆21Updated 4 years ago
- gup aka Get All Urls parameters to create wordlists for brute forcing parameters.☆18Updated 3 years ago
- ☆12Updated 3 years ago
- XSS Finder Via SSTI☆56Updated last year
- A Burp Extension that makes it easier to view all script code on a Response.☆16Updated last year
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆16Updated 4 years ago
- script python to check url list via cookies and Authorization☆19Updated 2 years ago
- A tool for Subdomain takeovers detection☆26Updated 2 years ago
- Cool One Liners at one place to make your recon and bug bounty skills better !☆16Updated 4 years ago