jakejarvis / subtakeLinks
Automatic finder for subdomains vulnerable to takeover. Written in Go, based on @haccer's subjack.
☆148Updated 4 years ago
Alternatives and similar repositories for subtake
Users that are interested in subtake are comparing it to the libraries listed below
Sorting:
- List of domains in scope for bug bounties (HackerOne, Bugcrowd, etc.)☆72Updated 4 years ago
- A tool to find sensitive keys and passwords in Travis logs☆142Updated 3 years ago
- A script to extract subdomains/emails for a given domain using SSL/TLS certificate dataset on Censys☆152Updated 2 years ago
- Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl and Filter Urls With OpenRedirection or SS…☆170Updated 4 years ago
- jsonp is a Burp Extension which attempts to reveal JSONP functionality behind JSON endpoints.☆152Updated 4 years ago
- subdomain bruteforce list☆101Updated 8 months ago
- Push notifications for passive DNS data☆109Updated 9 years ago
- Resolve and quickly portscan a list of (sub)domains.☆86Updated 8 years ago
- CollabOzark is a simple tool which helps the researchers track SSRF, RCE, Blind XSS, XXE, External Resource Access payloads triggers.☆137Updated 5 years ago
- This Repo contains wordlist for subdomain enumeration , php file path, html file path, and js file path☆103Updated 4 years ago
- ☆194Updated 6 years ago
- Automated blind-xss search for Burp Suite☆284Updated 5 years ago
- You can read the writeup on this script here☆275Updated 4 years ago
- a .js scanner, built in php. designed to scrape urls and other info☆219Updated 7 years ago
- List HackerOne private program assets☆152Updated 3 years ago
- A script that can resolve an input file of domains and scan them with masscan☆156Updated 4 years ago
- A script to extract domain names from Content Security Policy(CSP) headers☆112Updated 6 years ago
- A collection of scripts to extend Burp Suite☆142Updated 6 years ago
- Cross Origin Resource Sharing MisConfiguration Scanner☆173Updated 3 years ago
- Weaponizing Live CT logs for automated monitoring of assets☆134Updated 3 years ago
- ASN target organization IP range attack surface mapping for reconnaissance, fast and lightweight☆207Updated 3 years ago
- Bass grabs you those "extra resolvers" you are missing out on when performing Active DNS enumeration. Add anywhere from 100-6k resolvers …☆147Updated last year
- Wordlist for content(directory) bruteforce discovering with Burp or dirsearch☆214Updated 8 months ago
- Various Payload wordlists☆236Updated last month
- Command line tool for testing CRLF injection on a list of domains.☆163Updated last year
- A permutation generation tool written in golang☆210Updated 5 years ago
- Burp extension to detect alias traversal via NGINX misconfiguration at scale.☆260Updated 3 years ago
- CRLF and open redirect fuzzer☆112Updated 3 years ago
- Continuous monitoring for JavaScript files☆220Updated 5 years ago
- GoFingerprint is a Go tool for taking a list of target web servers and matching their HTTP responses against a user defined list of fing…☆203Updated 2 years ago