kp625544 / subtake
Extension of sublister tool to check for subdomain takeovers
☆22Updated 6 years ago
Related projects: ⓘ
- BURP extension providing a set of values for the HTTP request "Host" header for the "BURP Intruder" in order to abuse virtual host resolu…☆60Updated 6 years ago
- Actarus is a custom tool for bug bounty☆75Updated 4 years ago
- Purpose of this repository is to help all the beginner and experienced professionals to understand,learn and share new tricks for the com…☆31Updated 6 years ago
- A simple tool with the power of "Go" to find the hidden Vhosts defined at the server.☆18Updated 5 years ago
- dork scanner with Sqli and Lfi testing☆29Updated 6 years ago
- Simple Server Side Request Forgery services enumeration tool.☆54Updated 6 years ago
- ☆18Updated 7 years ago
- This repository contains all the material from the talk "Practical recon techniques for bug hunters & pentesters" given at Bugcrowd Level…☆60Updated 5 years ago
- XSSor is a semi-automatic reflected and persistent XSS detector extension for Burp Suite. The tool was written in Python by Barak Tawily,…☆45Updated 3 years ago
- Cross-Site-Scripting (XSS) Automatic Scanner☆42Updated 3 years ago
- ☆36Updated this week
- Preventing malicious takeover of the retired slurp AWS tool☆41Updated 6 years ago
- CPH:SEC WAES: Web Auto Enum & Scanner - Auto enums website(s) and dumps files as result☆65Updated 11 months ago
- PHP tool to test XSS☆23Updated 4 years ago
- XXRF Shots - Useful for testing SSRF vulnerability☆74Updated last year
- This script is intended to automate your reconnaissance process in an organized fashion☆38Updated 5 years ago
- Collection of scripts that aid in penetration testing of JSON Web Tokens☆58Updated 5 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 4 years ago
- This repository for training application security.☆26Updated 5 years ago
- Practice Web App written in python with some vulnerabilities.☆34Updated 3 years ago
- A simple Cherry Tree template that can be used to organize bug bounties☆33Updated 5 years ago
- ☆61Updated this week
- Automatic remote/local file inclusion vulnerability analysis and exploit tool☆60Updated 5 years ago
- Web Application Security related tools. Includes backdoors, proof of concepts and tricks☆36Updated 9 years ago
- Takeover script extracts CNAME record of all subdomains at once. TakeOver saves researcher time and increase the chance of finding subdom…☆101Updated last year
- Scripts for Deploying new server☆46Updated 6 years ago
- The Cleveridge Subdomain Scanner finds subdomains of a given domain.☆36Updated 4 years ago
- Traverse JS files for APIs/Endpoints☆15Updated 9 years ago
- ☆45Updated this week