jhaddix / can-i-take-over-xyz
"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
☆39Updated 6 years ago
Alternatives and similar repositories for can-i-take-over-xyz:
Users that are interested in can-i-take-over-xyz are comparing it to the libraries listed below
- A python script that finds endpoints in JavaScript files☆43Updated 5 years ago
- A high-performance DNS stub resolver for bulk lookups☆21Updated 7 years ago
- Automated reconnaissance wrapper — TomNomNom's meg on steroids.☆31Updated 6 years ago
- This script is intended to automate your reconnaissance process in an organized fashion☆40Updated 7 years ago
- SSLScrape | A scanning tool for scaping hostnames from SSL certificates.☆44Updated 6 years ago
- In-depth DNS Enumeration and Network Mapping☆34Updated 6 years ago
- Ease-of-use extension for Web Application penetration testing☆22Updated 7 years ago
- a .js scanner, built in php. designed to scrape urls and other info☆11Updated 7 years ago
- The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable we…☆13Updated 7 years ago
- Awesome cloud enumerator☆40Updated 4 years ago
- A XSS mind map ;)☆86Updated 9 years ago
- A static website template for security pages.☆15Updated 6 years ago
- Chrome Extension for XSS Hunter Payloads☆13Updated 8 years ago
- Community curated list of template files for the nuclei engine to find security vulnerability and fingerprinting the targets.☆31Updated 4 years ago
- ASN reconnaissance script☆25Updated 4 years ago
- Data from my Sunday streams☆75Updated 5 years ago
- List of Google Dorks for sites that have responsible disclosure program / bug bounty program☆21Updated 5 years ago
- ☆51Updated 4 years ago
- Taktiksel Bug Hunting Yöntemleri☆43Updated 8 years ago
- ASN reconnaissance script☆127Updated last year
- Bash script to automate Bug Bounty Reconnaissance☆38Updated 4 years ago
- The tools I have programmed to help me with bugbounty's☆115Updated 5 years ago
- Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures t…☆211Updated 5 years ago
- An automation framework for running multiple open sourced subdomain bruteforcing tools (in parallel) using your own wordlists via Docker …☆17Updated 7 years ago
- A script that can resolve an input file of domains and scan them with masscan☆157Updated 4 years ago
- ☆30Updated 4 years ago
- This script is (Mainly) for Beginner's☆62Updated 3 years ago
- In-depth Attack Surface Mapping and Asset Discovery☆24Updated 4 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆109Updated 7 years ago
- A listing of the most common vuln that you can link in your PoCs☆28Updated 6 years ago