musana / mx-takeover
mx-takeover focuses DNS MX records and detects misconfigured MX records.
☆346Updated last year
Alternatives and similar repositories for mx-takeover:
Users that are interested in mx-takeover are comparing it to the libraries listed below
- hakip2host takes a list of IP addresses via stdin, then does a series of checks to return associated domain names.☆441Updated 2 years ago
- Discover new target domains using Content Security Policy☆416Updated this week
- Crtsh Subdomain Enumeration | This bash script makes it easy to quickly save and parse the output from https://crt.sh website.☆217Updated 7 months ago
- Gotator is a tool to generate DNS wordlists through permutations.☆473Updated 2 years ago
- ☆318Updated 3 months ago
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆182Updated 2 years ago
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆287Updated last year
- Filter and enrich a list of subdomains by level☆201Updated last year
- Customisable and automated HTTP header injection☆245Updated 9 months ago
- Turns any junk text into a usable wordlist for brute-forcing.☆219Updated last year
- A Security Tool for Enumerating WebSockets☆346Updated 3 years ago
- Simple tool to scan a website for (DOM-based) XSS vulnerabilities and Open Redirects.☆237Updated 2 months ago
- A tool to quickly do keyword searches over Gitlab and Github for OSINT & bug bounty recon☆236Updated last year
- User-Agent , X-Forwarded-For and Referer SQLI Fuzzer☆382Updated last year
- Generate tens of thousands of subdomain combinations in a matter of seconds☆267Updated last year
- Fleex makes it easy to create multiple VPS on cloud providers and use them to distribute workloads.☆258Updated 7 months ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆631Updated last year
- Monitoring framework to detect and report newly found subdomains on a specific target using various scanning tools☆273Updated 9 months ago
- This Burp Suite extension allows for the automatic creation and deletion of an upstream SOCKS5 proxy on popular cloud services.☆241Updated last month
- Web dashboard for Interactsh client☆210Updated last week
- Use favicon.ico to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.☆205Updated last week
- Automated learning of regexes for DNS discovery☆364Updated 2 years ago
- An Automated Subdomain Enumeration Tool☆260Updated 6 months ago
- Golang client for querying SecurityTrails API data☆551Updated last year
- Small tool to Grab subdomains using Shodan api.☆433Updated 5 months ago
- Make URL path combinations using a wordlist☆174Updated last year
- Vulnerability Scan with Nuclei☆252Updated 5 months ago
- Prototype pollution scanner using headless chrome☆217Updated 2 years ago
- A streamlined tool for discovering private TLDs for security research.☆188Updated this week
- Get related domains / subdomains by looking at Google Analytics IDs☆243Updated 2 years ago