"Can I take over DNS?" — a list of DNS providers and how to claim vulnerable domains.
☆1,084Mar 3, 2025Updated last year
Alternatives and similar repositories for can-i-take-over-dns
Users that are interested in can-i-take-over-dns are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,605Feb 8, 2025Updated last year
- Scope aggregation tool for HackerOne, Bugcrowd, Intigriti, YesWeHack, and Immunefi!☆1,348Updated this week
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆1,029Feb 22, 2026Updated last month
- ☆755Jun 26, 2024Updated last year
- Gotator is a tool to generate DNS wordlists through permutations.☆509Jul 17, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one pl…☆1,040Aug 23, 2025Updated 7 months ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,124Aug 14, 2024Updated last year
- mx-takeover focuses DNS MX records and detects misconfigured MX records.☆357Jul 17, 2023Updated 2 years ago
- Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned ent…☆2,146Feb 23, 2026Updated last month
- Making Favicon.ico based Recon Great again !☆1,269Aug 29, 2023Updated 2 years ago
- DNSTake — A fast tool to check missing hosted DNS zones that can lead to subdomain takeover☆853Feb 13, 2023Updated 3 years ago
- Hidden parameters discovery suite☆2,038Sep 8, 2024Updated last year
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,323Aug 7, 2025Updated 7 months ago
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆562Mar 8, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A repository that includes all the important wordlists used while bug hunting.☆1,386Mar 11, 2023Updated 3 years ago
- This repo contains hourly-updated data dumps of bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) that are eligible for …☆3,675Updated this week
- declutters url lists for crawling/pentesting☆1,539Feb 23, 2025Updated last year
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,785May 22, 2024Updated last year
- ☆437Jun 1, 2021Updated 4 years ago
- BBT - Bug Bounty Tools (examples💡)☆1,887Apr 5, 2024Updated last year
- Automation for javascript recon in bug bounty.☆1,073Sep 9, 2023Updated 2 years ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆754Dec 19, 2023Updated 2 years ago
- Nuclei templates written by geeknik. Claude is my co-pilot. 🤖☆297Feb 24, 2026Updated last month
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.☆4,860Mar 20, 2026Updated last week
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆964Dec 31, 2021Updated 4 years ago
- Generate tens of thousands of subdomain combinations in a matter of seconds☆274Sep 25, 2023Updated 2 years ago
- Client Side Prototype Pollution Scanner☆523Sep 17, 2022Updated 3 years ago
- DNS resolution tracing tool☆35Jun 29, 2021Updated 4 years ago
- Rockyou for web fuzzing☆3,099Mar 11, 2026Updated 2 weeks ago
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,535Mar 8, 2026Updated 3 weeks ago
- De-clutter a list of URLs☆385Mar 8, 2026Updated 3 weeks ago
- Prototype Pollution and useful Script Gadgets☆1,601Jan 27, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- 🍪 CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.☆969Jan 10, 2025Updated last year
- Asset inventory of over 800 public bug bounty programs.☆1,526Feb 14, 2025Updated last year
- ☆383May 17, 2023Updated 2 years ago
- Contextual Content Discovery Tool☆3,128Apr 29, 2024Updated last year
- Scrape domain names from SSL certificates of arbitrary hosts☆689Mar 31, 2024Updated last year
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙☆1,824Jun 9, 2024Updated last year
- Obtain GraphQL API schema even if the introspection is disabled☆1,412Dec 5, 2025Updated 3 months ago