hehacksdark / AdamsReconLinks
AdamsScan is an automated subdomain enumeration script that utilizes multiple popular tools and APIs like Sublist3r, Amass, Subfinder, crt.sh, findomain and TheHarvester. It helps security researchers discover subdomains, gather valuable information, and streamline passive reconnaissance for security assessments.
☆25Updated 3 months ago
Alternatives and similar repositories for AdamsRecon
Users that are interested in AdamsRecon are comparing it to the libraries listed below
Sorting:
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆82Updated this week
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆235Updated 2 weeks ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 9 months ago
- Find CVEs associated to Linux and public exploits on github☆117Updated last month
- ☆38Updated 3 weeks ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆122Updated 9 months ago
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆101Updated 2 weeks ago
- Everything from my OSEP study.☆124Updated 4 months ago
- My notes while studying for the PNPT from TCM Security.☆73Updated last year
- ☆51Updated last year
- OSCP Cheatsheet by Sai Sathvik☆70Updated last year
- The repository contains useful GitHub dorks for finding open-source vulnerabilities.☆77Updated last year
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆53Updated 5 months ago
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆53Updated 5 months ago
- ☆70Updated 5 months ago
- SubOwner - A Simple tool check for subdomain takeovers.☆112Updated 7 months ago
- This is CheatSheet which I used on PJPT exam to fully compromise Domain Controller by doing internal network penentration testing.☆72Updated last year
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆139Updated 2 months ago
- 🕵️ Email osint tool☆61Updated last year
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆136Updated 2 weeks ago
- SQLMutant is a powerful SQL injection testing tool that includes both passive and active reconnaissance processes for any given domain. I…☆149Updated 6 months ago
- Very Vulnerable Management API (VVMA) is a deliberately insecure RESTful API built with Node.js for educational and testing purposes. It …☆59Updated 2 months ago
- Scripts, files, cheatsheets and more used for pentesting and my OSWE / AWAE exam.☆87Updated 3 weeks ago
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆50Updated 3 years ago
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆194Updated 5 months ago
- ☆183Updated last month
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆247Updated 2 months ago
- Knowledge Management for Offensive Security Professionals Official Repository☆143Updated 3 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆77Updated 7 months ago
- ☆93Updated 2 months ago