nahamsec / crtndstry
Yet another subdomain finder
☆202Updated 5 years ago
Alternatives and similar repositories for crtndstry:
Users that are interested in crtndstry are comparing it to the libraries listed below
- Trying to make automated recon for bug bounties☆252Updated 3 years ago
- Simple shell script for automated domain recognition with some tools☆299Updated 4 years ago
- Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures t…☆209Updated 4 years ago
- You can read the writeup on this script here☆193Updated 3 years ago
- An automated approach to performing recon for bug bounty hunting and penetration testing.☆440Updated 4 years ago
- ☆424Updated 2 years ago
- Reconnaissance tool which scans javascript files for subdomains and then iterates over all javascript files hosted on subsequent subdomai…☆223Updated 4 years ago
- Generates lists of live hosts and URLs for targeting, automating the usage of MassDNS, Masscan and nmap to filter out unreachable hosts a…☆364Updated 2 years ago
- A script that can resolve an input file of domains and scan them with masscan☆157Updated 4 years ago
- information gathering☆273Updated 11 months ago
- An open source tool to aid in command line driven generation of bug bounty reports based on user provided templates.☆210Updated 4 years ago
- ☆124Updated 4 years ago
- The project contains multiple shell scripts for automating the tasks during recon.☆175Updated last year
- Poor (rich?) man's bug bounty pipeline https://dubell.io☆274Updated last year
- Burp Extension for easily creating Wordlists☆211Updated 3 years ago
- Random utilities from my security projects that might be useful to others☆179Updated last month
- Burp Extension written in Jython to hunt for common vulnerabilities found in websites. Developed by Gaurav Narwani to help people find vu…☆235Updated 4 years ago
- Python library and CLI for the Bug Bounty Recon API☆223Updated 3 years ago
- ☆241Updated 6 years ago
- Secret and/or credential patterns used for gf.☆240Updated 2 years ago
- ☆191Updated 5 years ago
- Turbo Intruder Scripts☆222Updated 4 years ago
- This repository created for personal use and added tools from my latest blog post.☆348Updated 2 years ago
- Web Application recon automation☆124Updated 4 years ago
- A DNS Bruteforcing Wordlist Generator☆355Updated 2 years ago
- The tools I have programmed to help me with bugbounty's☆114Updated 5 years ago
- ☆360Updated 3 years ago
- Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl and Filter Urls With OpenRedirection or SS…☆168Updated 4 years ago
- You can read the writeup on this script here☆270Updated 4 years ago
- Various Payload wordlists☆235Updated 4 years ago