j1t3sh / SUB-ZView external linksLinks
A Complete SubDomain Enumeration Tool
☆25Oct 23, 2022Updated 3 years ago
Alternatives and similar repositories for SUB-Z
Users that are interested in SUB-Z are comparing it to the libraries listed below
Sorting:
- Automated Recon Framework☆24Oct 3, 2020Updated 5 years ago
- Automating the SQL Injection through Google dorks.☆26Sep 30, 2022Updated 3 years ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 6 years ago
- For finding secrets, tokens and other common mistakes made by developers.☆12Oct 21, 2025Updated 3 months ago
- A simulation of the RFCTF KOTH game.☆10Aug 14, 2020Updated 5 years ago
- Remove Offensive and Profane Words from Wordlists☆15Jul 27, 2023Updated 2 years ago
- Reconnaisance Tool☆12Jun 4, 2020Updated 5 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Collection of slides for security presentations I've given in various forums☆14Dec 10, 2023Updated 2 years ago
- Simple proxyless Discord friend request spammer.☆13Dec 2, 2022Updated 3 years ago
- A simulated WiFi capture the flag setup☆18Nov 1, 2022Updated 3 years ago
- Reverse proxy for ultra-low latency streaming☆31May 30, 2024Updated last year
- This tool will help in generating reverse shells easily for all types of OS.☆20Aug 4, 2023Updated 2 years ago
- gathering or searching websites that are vulnerable to sql injection ( GUI Tools )☆33Dec 18, 2019Updated 6 years ago
- [CVE-2017-9822] DotNetNuke Cookie Deserialization Remote Code Execution (RCE)☆20Aug 30, 2020Updated 5 years ago
- Network and web related exploratory playground.☆19Apr 6, 2016Updated 9 years ago
- Simultaneously execute various subdomain enumeration tools and aggregate results.☆42Jun 19, 2024Updated last year
- Commands to perform various activities related to penetration testing and red teaming☆20Jan 17, 2020Updated 6 years ago
- All in one subdomain Enumeration tool☆21Jan 1, 2023Updated 3 years ago
- OASAM is the acronym of Open Android Security Assessment Methodology and its purpose is to become a reference framework on Android applic…☆85Apr 11, 2022Updated 3 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Jun 19, 2022Updated 3 years ago
- A utility to quickly map IP addresses to their respective ASN☆20Aug 26, 2023Updated 2 years ago
- #1 DISCORD AIO☆41Mar 10, 2024Updated last year
- Explorer is a very useful tool which will help you in the Recon phase in Bug Bounty hunting or Web Pentesting. It can perform a lot of th…☆23Sep 26, 2020Updated 5 years ago
- Malicious DLL Generator in Py3☆27Jul 8, 2020Updated 5 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Jan 2, 2021Updated 5 years ago
- Write-Ups for TryHackMe☆23May 15, 2021Updated 4 years ago
- IP Puller, IP Sniffer and IP grabber for PS4 and Xbox☆13Jan 7, 2021Updated 5 years ago
- People Profiler (fake script)☆25Oct 13, 2024Updated last year
- ALAT TOLL KEPERLUAN ONLINE☆13Jan 10, 2019Updated 7 years ago
- How cool would it be to learn Linux through the man pages To make it even more fun, I made this script with various options and with a co…☆39Jan 8, 2022Updated 4 years ago
- Burp Suite plugin that dynamically generates Google 2FA codes for use in session handling rules (approved by PortSwigger for inclusion in…☆29Sep 4, 2025Updated 5 months ago
- This script scrapes the list of open Bug Bounty Programs from openbugbounty.org☆28Mar 22, 2022Updated 3 years ago
- Write-up for the Active Directory Lab I have created for Akerva exhibition stand @ leHACK19 (Paris)