"Can I take over DNS?" — a list of DNS providers and how to claim vulnerable domains.
☆1,085Mar 3, 2025Updated last year
Alternatives and similar repositories for can-i-take-over-dns
Users that are interested in can-i-take-over-dns are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,624Feb 8, 2025Updated last year
- Scope aggregation tool for HackerOne, Bugcrowd, Intigriti, YesWeHack, and Immunefi!☆1,361Apr 4, 2026Updated 2 weeks ago
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆1,154Apr 3, 2026Updated 2 weeks ago
- ☆755Jun 26, 2024Updated last year
- Gotator is a tool to generate DNS wordlists through permutations.☆511Jul 17, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one pl…☆1,039Aug 23, 2025Updated 7 months ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,153Aug 14, 2024Updated last year
- mx-takeover focuses DNS MX records and detects misconfigured MX records.☆358Jul 17, 2023Updated 2 years ago
- Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned ent…☆2,154Feb 23, 2026Updated last month
- Making Favicon.ico based Recon Great again !☆1,272Aug 29, 2023Updated 2 years ago
- DNSTake — A fast tool to check missing hosted DNS zones that can lead to subdomain takeover☆853Feb 13, 2023Updated 3 years ago
- Hidden parameters discovery suite☆2,047Sep 8, 2024Updated last year
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,336Aug 7, 2025Updated 8 months ago
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆563Mar 8, 2025Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A repository that includes all the important wordlists used while bug hunting.☆1,396Mar 11, 2023Updated 3 years ago
- This repo contains hourly-updated data dumps of bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) that are eligible for …☆3,698Updated this week
- Automation for javascript recon in bug bounty.☆1,081Sep 9, 2023Updated 2 years ago
- declutters url lists for crawling/pentesting☆1,545Feb 23, 2025Updated last year
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆640Jul 7, 2025Updated 9 months ago
- ☆436Jun 1, 2021Updated 4 years ago
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,812May 22, 2024Updated last year
- BBT - Bug Bounty Tools (examples💡)☆1,884Apr 5, 2024Updated 2 years ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆754Dec 19, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Nuclei templates written by geeknik. Claude is my co-pilot. 🤖☆298Feb 24, 2026Updated last month
- Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.☆4,883Mar 20, 2026Updated 3 weeks ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆965Dec 31, 2021Updated 4 years ago
- Generate tens of thousands of subdomain combinations in a matter of seconds☆275Sep 25, 2023Updated 2 years ago
- Client Side Prototype Pollution Scanner☆524Sep 17, 2022Updated 3 years ago
- DNS resolution tracing tool☆35Jun 29, 2021Updated 4 years ago
- Rockyou for web fuzzing☆3,121Mar 11, 2026Updated last month
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,543Mar 8, 2026Updated last month
- De-clutter a list of URLs☆386Mar 8, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Prototype Pollution and useful Script Gadgets☆1,607Jan 27, 2024Updated 2 years ago
- 🍪 CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.☆968Jan 10, 2025Updated last year
- Asset inventory of over 800 public bug bounty programs.☆1,536Feb 14, 2025Updated last year
- ☆384May 17, 2023Updated 2 years ago
- Contextual Content Discovery Tool☆3,145Apr 29, 2024Updated last year
- Scrape domain names from SSL certificates of arbitrary hosts☆690Mar 31, 2024Updated 2 years ago
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙☆1,832Jun 9, 2024Updated last year