jakejarvis / subtakeLinks
Automatic finder for subdomains vulnerable to takeover. Written in Go, based on @haccer's subjack.
☆147Updated 5 years ago
Alternatives and similar repositories for subtake
Users that are interested in subtake are comparing it to the libraries listed below
Sorting:
- A tool to find sensitive keys and passwords in Travis logs☆141Updated 4 years ago
- List of domains in scope for bug bounties (HackerOne, Bugcrowd, etc.)☆75Updated 4 years ago
- jsonp is a Burp Extension which attempts to reveal JSONP functionality behind JSON endpoints.☆154Updated 4 years ago
- A collection of scripts to extend Burp Suite☆142Updated 6 years ago
- Automated blind-xss search for Burp Suite☆286Updated 6 years ago
- You can read the writeup on this script here☆275Updated 5 years ago
- A script to extract subdomains/emails for a given domain using SSL/TLS certificate dataset on Censys☆152Updated 2 years ago
- A script to extract domain names from Content Security Policy(CSP) headers☆112Updated 6 years ago
- Burp Suite extension to discover assets from HTTP response.☆230Updated 9 months ago
- Pass list of urls with FUZZ in and it will check if it has found a potential SSRF.☆110Updated 3 years ago
- CollabOzark is a simple tool which helps the researchers track SSRF, RCE, Blind XSS, XXE, External Resource Access payloads triggers.☆135Updated 6 years ago
- Push notifications for passive DNS data☆109Updated 9 years ago
- ☆196Updated 6 years ago
- Burp Suite Extension to monitor new scope☆199Updated 4 years ago
- subdomain bruteforce list☆102Updated last year
- Bass grabs you those "extra resolvers" you are missing out on when performing Active DNS enumeration. Add anywhere from 100-6k resolvers …☆150Updated last year
- Smart ssrf scanner using different methods like parameter brute forcing in post and get...☆278Updated 4 years ago
- This Repo contains wordlist for subdomain enumeration , php file path, html file path, and js file path☆103Updated 5 years ago
- ASN target organization IP range attack surface mapping for reconnaissance, fast and lightweight☆218Updated 3 years ago
- Command line tool for testing CRLF injection on a list of domains.☆164Updated last year
- Weaponizing Live CT logs for automated monitoring of assets☆134Updated 4 years ago
- Wordlist for content(directory) bruteforce discovering with Burp or dirsearch☆215Updated last year
- Various Payload wordlists☆236Updated 5 months ago
- qsfuzz (Query String Fuzz) allows you to build your own rules to fuzz query strings and easily identify vulnerabilities.☆299Updated 2 years ago
- GoFingerprint is a Go tool for taking a list of target web servers and matching their HTTP responses against a user defined list of fing…☆205Updated 2 years ago
- Intelligent XSS detection tool that uses human techniques for looking for reflected cross-site scripting (XSS) vulnerabilities☆151Updated 2 years ago
- Toolset for detecting reflected xss in websites☆116Updated 7 years ago
- Payloads for CRLF Injection☆225Updated last year
- CRLF and open redirect fuzzer☆113Updated 4 years ago
- SQLi Query Tampering extends and adds custom Payload Generator/Processor in Burp Suite's Intruder. This extension gives you the flexibil…☆155Updated 5 years ago