kp625544 / subtakeLinks
Extension of sublister tool to check for subdomain takeovers
☆22Updated 7 years ago
Alternatives and similar repositories for subtake
Users that are interested in subtake are comparing it to the libraries listed below
Sorting:
- BURP extension providing a set of values for the HTTP request "Host" header for the "BURP Intruder" in order to abuse virtual host resolu…☆60Updated 7 years ago
- XXRF Shots - Useful for testing SSRF vulnerability☆74Updated 2 years ago
- Actarus is a custom tool for bug bounty☆76Updated 5 years ago
- A tool for fetching archived URLs (to be rewritten in Go).☆40Updated 6 years ago
- This script is intended to automate your reconnaissance process in an organized fashion☆39Updated 5 years ago
- This is a web application fuzzer scanner - the goal was CLI flexibility and rapid prototyping☆48Updated 5 years ago
- A bash script that fetches and maintains thousands of DNS resolvers☆65Updated 4 years ago
- Various tools for managing bug bounty recon and exploration.☆47Updated 2 years ago
- The Cleveridge Subdomain Scanner finds subdomains of a given domain.☆37Updated 5 years ago
- This repository contains all the material from the talk "Practical recon techniques for bug hunters & pentesters" given at Bugcrowd Level…☆60Updated 6 years ago
- dork scanner with Sqli and Lfi testing☆29Updated 7 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆37Updated 7 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆26Updated 6 years ago
- This tool will scan all the URL's in the file and will provide Content-Length, Status-Code, Server and more.☆36Updated 3 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- All-in-one AWS S3 bucket tool for pentesters.☆73Updated 6 years ago
- https://sites.google.com/securifyinc.com/secblogs/finding-leaked-sensitive-data☆17Updated 6 years ago
- Simple Server Side Request Forgery services enumeration tool.☆55Updated 6 years ago
- A collection of scripts used to interact with the Burp Rest API☆52Updated 6 years ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆46Updated 2 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆31Updated 7 years ago
- Tool that checks for path traversal traces in a given web application url, plus it is capable of multi-threading, set timeout and 5-layer…☆46Updated 6 years ago
- Burp Suite Importer - Connect to multiple web servers while populating the sitemap.☆48Updated 5 years ago
- Cross-Site-Scripting (XSS) Automatic Scanner☆43Updated 4 years ago
- Scan secrets from Continuous Integration Build Logs☆51Updated 5 years ago
- A simple tool with the power of "Go" to find the hidden Vhosts defined at the server.☆19Updated 6 years ago
- AWS S3 Bucket Finder.☆15Updated 5 years ago
- Convert your masscan/subdomain-scan results (80,443,8080) into screenshots for better analysis☆36Updated 6 years ago
- Pillage a git repo found in an accessible web root☆61Updated 14 years ago
- ☆34Updated 5 years ago