muneebwanee / SubScannerLinks
An automation tool that scans sub-domains, sub-domain takeover and then filters out xss, ssti, ssrf and more injection point parameters.
☆12Updated 4 years ago
Alternatives and similar repositories for SubScanner
Users that are interested in SubScanner are comparing it to the libraries listed below
Sorting:
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- CVE-2022-26134 - Pre-Auth Remote Code Execution via OGNL Injection☆4Updated 2 years ago
- Multifunctional open redirection vulnerability scanner.☆31Updated 3 years ago
- Apache APISIX Remote Code Execution (CVE-2022-24112) proof of concept exploit☆12Updated 3 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆28Updated 2 years ago
- Exploit for the unauthenticated file upload vulnerability in WordPress's Royal Elementor Addons and Templates plugin (< 1.3.79). CVE-ID: …☆9Updated last year
- 51Pwn Platform,为黑客而生的大数据搜索引擎,Big data search engine born for hackers☆31Updated 7 months ago
- This tool will help in generating reverse shells easily for all types of OS.☆20Updated last year
- Securely fetch saved passwords from Google☆9Updated last year
- hacking tools☆14Updated 2 years ago
- FUD MSFVenom Payload Gen. CatchYou 2 is a fork from CatchYou by TheLinuxChoice.☆13Updated 4 years ago
- Bulk email collection and retrieval, for hacker tools, mails dump☆13Updated 2 years ago
- NooB PyThon Matasploit Av Bypasser By Ali khan☆8Updated 4 years ago
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆28Updated 3 years ago
- auto MITM attack tools☆13Updated last year
- This Tool is for web penetration Testing.☆19Updated 4 years ago
- This is a windows maching login page designed using HTML, CSS and JS. This can be used for red teaming or cybersecurity awareness related…☆17Updated 3 years ago
- Bulk scanner + get config from CVE-2023-23752☆8Updated 2 years ago
- Steal telegram session Bypass 2fa☆18Updated 2 years ago
- I have collected different open source tools for my bug-bounty. So in this repo i have organized them in a systematic way. So whenever i …☆8Updated 2 years ago
- Using open Adb ports we can exploit a Andriod Device☆19Updated 5 years ago
- go-utils☆11Updated 11 months ago
- Automated Recon Tool Installer☆16Updated 2 years ago
- Small python or powershell script to look for potential subdomain takeover vulnerabilities via vulnerable Alias.☆8Updated 3 years ago
- Python Script to exploit Zimbra Auth Bypass + RCE (CVE-2022-27925)☆4Updated 2 years ago
- WordPress Plugin WP Statistics 13.0.7 - Time-Based Blind SQL Injection (Unauthenticated)☆13Updated 4 years ago
- Web application recon for bug bounty☆22Updated 5 years ago
- It finds Subject Alternative Names for a given list of domains☆8Updated 3 years ago
- Bruteforce tool for Pentester's lucky day targeting SSH-services.☆13Updated 4 years ago
- automatically crawl every URL and find cross site scripting (XSS)☆42Updated 3 years ago