junnlikestea / vitaLinks
A tool to find subdomains or domains from passive sources.
☆113Updated 4 years ago
Alternatives and similar repositories for vita
Users that are interested in vita are comparing it to the libraries listed below
Sorting:
- Bass grabs you those "extra resolvers" you are missing out on when performing Active DNS enumeration. Add anywhere from 100-6k resolvers …☆147Updated last year
- ☆108Updated 4 years ago
- A really simple utility to concate wordlists to a domain name - to pipe into your favourite resolver!☆87Updated 5 years ago
- CRLF and open redirect fuzzer☆111Updated 3 years ago
- A permutation generation tool written in golang☆210Updated 5 years ago
- Find subdomains and takeovers.☆85Updated 2 years ago
- Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl and Filter Urls With OpenRedirection or SS…☆170Updated 4 years ago
- A tool for append URLs, skipping duplicates/paths & combine parameters.☆121Updated 3 years ago
- ASN reconnaissance script☆127Updated last year
- Built on a lazy Sunday after seeing this tweet (https://twitter.com/intigriti/status/1272145863868104705?s=20) I present to you, Paramete…☆47Updated 4 years ago
- Get the scope of your bugcrowd programs☆67Updated 4 years ago
- A tool to perform permutations, mutations and alteration of subdomains in golang.☆159Updated last year
- Misc bounty and vulndisc things☆84Updated 4 years ago
- You can read the writeup on this script here☆193Updated 3 years ago
- Make concurrent requests with the curl command-line tool☆74Updated 5 years ago
- 📚 An ultimate collection wordlists of the best-known CMS☆90Updated 11 months ago
- Cross Origin Resource Sharing MisConfiguration Scanner☆173Updated 3 years ago
- List of fresh DNS resolvers updated daily☆108Updated 2 years ago
- Adds a customizable "Send to..."-context-menu to your BurpSuite.☆156Updated 2 years ago
- List HackerOne private program assets☆152Updated 3 years ago
- Push notifications for passive DNS data☆109Updated 9 years ago
- Secret and/or credential patterns used for gf.☆240Updated 2 years ago
- Bug Bounty Dork☆71Updated 3 years ago
- ☆76Updated 4 years ago
- ☆20Updated 2 years ago
- Extract relative urls from a heap snapshot☆87Updated 4 years ago
- Host Header Injection Checker☆81Updated 3 years ago
- Takeover AWS ips and have a working POC for Subdomain Takeover.☆91Updated 3 months ago
- ☆65Updated 2 years ago
- A Burp extension adding a passive scan check to flag parameters whose name or value may indicate a possible insertion point for SSRF or L…☆132Updated 4 years ago