kp625544 / subtakeLinks
Extension of sublister tool to check for subdomain takeovers
☆22Updated 7 years ago
Alternatives and similar repositories for subtake
Users that are interested in subtake are comparing it to the libraries listed below
Sorting:
- A simple Cherry Tree template that can be used to organize bug bounties☆37Updated 5 years ago
- Cross-Site-Scripting (XSS) Automatic Scanner☆43Updated 4 years ago
- dork scanner with Sqli and Lfi testing☆29Updated 7 years ago
- Actarus is a custom tool for bug bounty☆76Updated 5 years ago
- The Cleveridge Subdomain Scanner finds subdomains of a given domain.☆37Updated 5 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆37Updated 7 years ago
- A sub-domain enumeration tool☆19Updated 5 years ago
- This repository contains all the material from the talk "Practical recon techniques for bug hunters & pentesters" given at Bugcrowd Level…☆60Updated 6 years ago
- This is a web application fuzzer scanner - the goal was CLI flexibility and rapid prototyping☆48Updated 5 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- Collection of scripts that aid in penetration testing of JSON Web Tokens☆58Updated 6 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆31Updated 7 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆26Updated 6 years ago
- This script is intended to automate your reconnaissance process in an organized fashion☆39Updated 5 years ago
- Sparty - MS Sharepoint and Frontpage Auditing Tool☆31Updated 10 years ago
- XXRF Shots - Useful for testing SSRF vulnerability☆74Updated 2 years ago
- Takeover script extracts CNAME record of all subdomains at once. TakeOver saves researcher time and increase the chance of finding subdom…☆101Updated 2 years ago
- Simple Server Side Request Forgery services enumeration tool.☆55Updated 6 years ago
- This tests a list of s3 buckets to see if they have dir listings enabled or if they are uploadable☆55Updated last week
- Pillage a git repo found in an accessible web root☆61Updated 14 years ago
- This tool will scan all the URL's in the file and will provide Content-Length, Status-Code, Server and more.☆36Updated 3 years ago
- Various tools for managing bug bounty recon and exploration.☆47Updated 2 years ago
- A simple tool with the power of "Go" to find the hidden Vhosts defined at the server.☆19Updated 6 years ago
- A tool for fetching archived URLs (to be rewritten in Go).☆40Updated 6 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆163Updated 5 years ago
- Automating Jenkins Hacking using Shodan API☆94Updated 7 years ago
- Finds Directory Listings or open S3 buckets from a list of URLs☆52Updated 3 years ago
- Alpha version code of Recon UI☆14Updated 7 years ago
- A collection of scripts used to interact with the Burp Rest API☆52Updated 6 years ago
- OWASP Skanda - SSRF Exploitation Framework☆38Updated 11 years ago