m0rd3caii / rec0nLinks
A fully automated subdomain reconnaissance and sensitive data discovery toolkit.
☆42Updated 2 weeks ago
Alternatives and similar repositories for rec0n
Users that are interested in rec0n are comparing it to the libraries listed below
Sorting:
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆107Updated last month
- ☆94Updated 3 months ago
- ☆46Updated 4 months ago
- A collection of config files for linux focusing on hackthebox theme☆48Updated 6 months ago
- Advanced CORS Header Checker Tool with Vulnerability Detection and Bypass Attempts☆61Updated last month
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆189Updated 2 weeks ago
- ⚡ XSSuccessor is a powerful, asynchronous Cross-Site Scripting (XSS) detection tool.☆56Updated 6 months ago
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆100Updated 2 months ago
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆98Updated this week
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆157Updated last month
- BaldHead is a modular and interactive Active Directory (AD) attack framework built for red teamers and security testers. It automates enu…☆95Updated 3 weeks ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆120Updated 6 months ago
- ☆185Updated 2 months ago
- ☆66Updated last month
- Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-3847…☆98Updated 9 months ago
- Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques, such as: SPF records and DNS history. By default, Unw…☆91Updated last week
- ☆135Updated 3 months ago
- A list of all Active Directory machines from HackTheBox☆60Updated last week
- A Go-based utility that processes input through multiple AI models concurrently (OpenAI, Claude, and Gemini) and provides a summarized co…☆73Updated 3 weeks ago
- JWT Auditor – Analyze, break, and understand your tokens like a pro.☆37Updated this week
- AI/LLM local model integration for analysis of reconftw results☆65Updated 2 months ago
- ☆70Updated 3 weeks ago
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆53Updated 6 months ago
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆53Updated 6 months ago
- Search for all leaked keys/secrets using one regex! bugbounty☆133Updated 3 months ago
- ☆91Updated 3 months ago
- ☆25Updated 2 years ago
- A passive way to find backups/ sensitive information.☆84Updated this week
- Scripts, files, cheatsheets and more used for pentesting and my OSWE / AWAE exam.☆88Updated 2 weeks ago
- A Burp Suite extension that helps track and manage multiple sessions simultaneously by color-coding HTTP requests based on custom pattern…☆27Updated 7 months ago