mhmdiaa / second-orderLinks
Second-order subdomain takeover scanner
☆406Updated 5 months ago
Alternatives and similar repositories for second-order
Users that are interested in second-order are comparing it to the libraries listed below
Sorting:
- Default signature for Jaeles Scanner☆327Updated 3 years ago
- qsfuzz (Query String Fuzz) allows you to build your own rules to fuzz query strings and easily identify vulnerabilities.☆303Updated 3 years ago
- Security tool (now AI powered 🤖) to find potential vulnerable Server Side Request Forgery (SSRF) parameters.☆353Updated last week
- Bugbounty scope tool☆332Updated 11 months ago
- GoFingerprint is a Go tool for taking a list of target web servers and matching their HTTP responses against a user defined list of fing…☆207Updated 2 years ago
- An hourly updated list of subdomains gathered from certificate transparency logs☆349Updated 4 years ago
- Smart ssrf scanner using different methods like parameter brute forcing in post and get...☆280Updated 5 years ago
- You can read the writeup on this script here☆274Updated 5 years ago
- A simple SSRF-testing sheriff written in Go☆336Updated last year
- SSRF testing tool☆246Updated 3 years ago
- The Serverless Blind XSS App☆338Updated 8 months ago
- Generates lists of live hosts and URLs for targeting, automating the usage of MassDNS, Masscan and nmap to filter out unreachable hosts a…☆367Updated 3 years ago
- Monitoring framework to detect and report newly found subdomains on a specific target using various scanning tools☆284Updated last year
- Continuous monitoring for JavaScript files☆225Updated 6 years ago
- A DNS Bruteforcing Wordlist Generator☆362Updated 2 years ago
- Subdomain Takeover Scanner | Subdomain Takeover Tool | by 0x94☆366Updated 2 years ago
- Wordlists that have been compiled using Commonspeak2. This repo is updated every time new wordlists are generated.☆544Updated 7 years ago
- Turbo Intruder Scripts☆228Updated 5 years ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆261Updated 3 years ago
- Secret and/or credential patterns used for gf.☆243Updated 3 years ago
- A script that can resolve an input file of domains and scan them with masscan☆155Updated 5 years ago
- Security Testing Scripts for JWT☆327Updated 3 years ago
- Burp Extension written in Jython to hunt for common vulnerabilities found in websites. Developed by Gaurav Narwani to help people find vu…☆250Updated 5 years ago
- a .js scanner, built in php. designed to scrape urls and other info☆226Updated 8 years ago
- A simple variable based template editor using handlebarjs+strapdownjs. The idea is to use variables in markdown based files to easily rep…☆256Updated 2 years ago
- Reconnaissance tool which scans javascript files for subdomains and then iterates over all javascript files hosted on subsequent subdomai…☆223Updated 5 years ago
- Automated blind-xss search for Burp Suite☆287Updated 6 years ago
- DOM XSS scanner for Single Page Applications☆417Updated 2 months ago
- ReconNess is a platform to allow continuous recon (CR) where you can set up a pipeline of #recon tools (Agents) and trigger it base on sc…☆320Updated 3 weeks ago
- A handy DNS service written in Go to aid in the detection of several types of blind vulnerabilities. It monitors a pentester's server for…☆192Updated 5 years ago