Extension of sublister tool to check for subdomain takeovers
☆23Mar 7, 2018Updated 7 years ago
Alternatives and similar repositories for subtake
Users that are interested in subtake are comparing it to the libraries listed below
Sorting:
- Python client for p0f3 API☆15Jan 25, 2021Updated 5 years ago
- A custom script I created because I got tired of installing my tools manually!☆13Nov 19, 2024Updated last year
- https://sites.google.com/securifyinc.com/secblogs/finding-leaked-sensitive-data☆17Jun 14, 2018Updated 7 years ago
- Information Gathering Tool☆24Aug 16, 2013Updated 12 years ago
- badbucket checks your s3 bucket for common misconfigurations☆24Jun 25, 2017Updated 8 years ago
- Git Web Hook Tunnel for C2☆28Nov 7, 2023Updated 2 years ago
- ☆10Apr 20, 2022Updated 3 years ago
- A tool for recursively scanning websites for defacements☆10Nov 22, 2022Updated 3 years ago
- code written on artificial intelligence lab at school☆10Oct 4, 2021Updated 4 years ago
- ☆16Feb 7, 2019Updated 7 years ago
- ☆29Dec 13, 2023Updated 2 years ago
- 🍔⌨ Zom Zom Zomato CLI tool☆10Nov 7, 2017Updated 8 years ago
- Vector Tree Ring Generator for Pen Plotting☆12Oct 16, 2023Updated 2 years ago
- Website for The State of FOSS in India report.☆10Aug 20, 2021Updated 4 years ago
- Analyze apache log and display histograms and stats about the requests, in order to identify main problematic urls☆17Nov 10, 2025Updated 3 months ago
- Non-Alphanumeric JS Obfuscator☆14Aug 22, 2016Updated 9 years ago
- ☆16May 13, 2021Updated 4 years ago
- A PHP web interface for monitoring system resources on Linux servers.☆10Jun 30, 2016Updated 9 years ago
- ☆10Jul 23, 2022Updated 3 years ago
- Write ups for DRDO CTF☆10Jan 13, 2018Updated 8 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 3 months ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- A simple tool to convert the IP to a DWORD IP☆143Jul 29, 2022Updated 3 years ago
- Known WannCrypt Bitcoin addresses☆10Jul 17, 2017Updated 8 years ago
- ☆10Mar 15, 2021Updated 4 years ago
- A command-line tool for producing animations of solar eclipses☆11Oct 16, 2022Updated 3 years ago
- Natural language hashing library.☆10Nov 24, 2014Updated 11 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- track your food!☆11Feb 8, 2017Updated 9 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Malware WinXPSP2.Cermalus Windows Kernel Virus☆14Aug 11, 2023Updated 2 years ago
- Animated version of the "starmap-northern" script☆10May 9, 2018Updated 7 years ago
- an awesome list of honeypot resources☆10Jul 14, 2017Updated 8 years ago
- An IRC markov bot based on Twisted.☆18Nov 17, 2008Updated 17 years ago
- Telegram Bot that performs checks of the yararules.com ruleset☆13May 13, 2016Updated 9 years ago
- Tracking APIs for couriers with major courier companies.☆10May 22, 2023Updated 2 years ago
- Attempting to decode the mysterious /r/A858DE45F56D9BC9 subreddit data☆11Jun 11, 2015Updated 10 years ago
- Proof of Concept of the steganographic algorithms implemented by APT 29 (Hammertos)☆10Nov 26, 2018Updated 7 years ago
- XXE injection (file disclosure) exploit for Apache OFBiz < 16.11.04☆13Oct 16, 2018Updated 7 years ago