mhmdiaa / second-order
Second-order subdomain takeover scanner
☆389Updated 2 years ago
Alternatives and similar repositories for second-order:
Users that are interested in second-order are comparing it to the libraries listed below
- Default signature for Jaeles Scanner☆319Updated 3 years ago
- Monitoring framework to detect and report newly found subdomains on a specific target using various scanning tools☆273Updated 9 months ago
- Smart ssrf scanner using different methods like parameter brute forcing in post and get...☆275Updated 4 years ago
- qsfuzz (Query String Fuzz) allows you to build your own rules to fuzz query strings and easily identify vulnerabilities.☆301Updated 2 years ago
- GoFingerprint is a Go tool for taking a list of target web servers and matching their HTTP responses against a user defined list of fing…☆205Updated last year
- Bugbounty scope tool☆328Updated 2 months ago
- Subdomain Takeover Scanner | Subdomain Takeover Tool | by 0x94☆361Updated last year
- Secret and/or credential patterns used for gf.☆241Updated 2 years ago
- The Serverless Blind XSS App☆340Updated 3 months ago
- You can read the writeup on this script here☆273Updated 4 years ago
- Wordlists that have been compiled using Commonspeak2. This repo is updated every time new wordlists are generated.☆531Updated 6 years ago
- Turbo Intruder Scripts☆221Updated 4 years ago
- Generates lists of live hosts and URLs for targeting, automating the usage of MassDNS, Masscan and nmap to filter out unreachable hosts a…☆365Updated 2 years ago
- SSRF testing tool☆245Updated 2 years ago
- An hourly updated list of subdomains gathered from certificate transparency logs☆346Updated 3 years ago
- Nuclei templates written by us.☆270Updated 3 years ago
- A DNS Bruteforcing Wordlist Generator☆357Updated 2 years ago
- A script that can resolve an input file of domains and scan them with masscan☆157Updated 4 years ago
- Fetches javascript file from a list of URLS or subdomains.☆766Updated last year
- A handy DNS service written in Go to aid in the detection of several types of blind vulnerabilities. It monitors a pentester's server for…☆191Updated 4 years ago
- Python tool to find potential Server Side Reqest Forgery (SSRF) vulnerability parameters.☆320Updated last month
- Reconnaissance tool which scans javascript files for subdomains and then iterates over all javascript files hosted on subsequent subdomai…☆223Updated 4 years ago
- information gathering☆276Updated last year
- This repository created for personal use and added tools from my latest blog post.☆349Updated 2 years ago
- Trying to make automated recon for bug bounties☆253Updated 4 years ago
- Takes a list of URLs and returns their HTTP response codes☆394Updated last year
- Automated security reporting from markdown templates (HackerOne and Bugcrowd are currently the platforms supported)☆453Updated 5 years ago
- TheftFuzzer is a tool that fuzzes Cross-Origin Resource Sharing implementations for common misconfigurations.☆315Updated last year
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆259Updated 2 years ago
- Web Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security prof…☆412Updated 4 years ago