hehacksdark / AdamsRecon
AdamsScan is an automated subdomain enumeration script that utilizes multiple popular tools and APIs like Sublist3r, Amass, Subfinder, crt.sh, findomain and TheHarvester. It helps security researchers discover subdomains, gather valuable information, and streamline passive reconnaissance for security assessments.
☆24Updated 2 months ago
Alternatives and similar repositories for AdamsRecon
Users that are interested in AdamsRecon are comparing it to the libraries listed below
Sorting:
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 8 months ago
- The repository contains useful GitHub dorks for finding open-source vulnerabilities.☆77Updated last year
- Very Vulnerable Management API (VVMA) is a deliberately insecure RESTful API built with Node.js for educational and testing purposes. It …☆56Updated 2 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆108Updated last month
- A deliberately vulnerable banking application designed for practicing secure code reviews and API security testing. Features common vulne…☆192Updated last week
- ☆78Updated 2 years ago
- SQLMutant is a powerful SQL injection testing tool that includes both passive and active reconnaissance processes for any given domain. I…☆148Updated 5 months ago
- Find CVEs associated to Linux and public exploits on github☆117Updated last month
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆231Updated last week
- This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer whil…☆49Updated 2 weeks ago
- 𝗖𝗼𝗺𝗽𝗹𝗲𝘁𝗲 𝗕𝘂𝗴 𝗕𝗼𝘂𝗻𝘁𝘆 𝗥𝗼𝗮𝗱𝗺𝗮𝗽 🎯☆81Updated 2 months ago
- ☆93Updated last month
- Scripts, files, cheatsheets and more used for pentesting and my OSWE / AWAE exam.☆86Updated 3 weeks ago
- ☆72Updated 4 months ago
- Knowledge Management for Offensive Security Professionals Official Repository☆140Updated 2 months ago
- ⚡ XSSuccessor is a powerful, asynchronous Cross-Site Scripting (XSS) detection tool.☆54Updated 4 months ago
- This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-up…☆62Updated this week
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆114Updated 4 months ago
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆53Updated 4 months ago
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆51Updated 4 months ago
- Here are some cool and some unpublished Dorks☆73Updated 3 months ago
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆181Updated 4 months ago
- OSCP Cheatsheet by Sai Sathvik☆69Updated last year
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆14Updated 2 years ago
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆135Updated last month
- Python for AWAE (Advanced Web Attacks and Exploitation)☆94Updated last year
- ☆51Updated last year
- Bug Bounty Hunting Framework Designed to Help Beginners Compete w/ the Pros☆106Updated last week
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆92Updated 9 months ago
- My notes while studying for the PNPT from TCM Security.☆72Updated last year