nexxai / Substr3amLinks
Passive reconnaissance/enumeration of interesting targets by watching for SSL certificates being issued
☆68Updated 3 years ago
Alternatives and similar repositories for Substr3am
Users that are interested in Substr3am are comparing it to the libraries listed below
Sorting:
- REST API backend for Reconmap☆47Updated last week
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Updated 4 years ago
- Another Subdomain ENumeration Tool☆12Updated 3 years ago
- Unique wordlist generator of unique wordlists.☆42Updated 2 years ago
- Offensive Security recon tool☆92Updated 4 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆45Updated 10 months ago
- Static analysis of wordpress plugins☆61Updated 4 years ago
- A docker image which will enumerate, sort, unique and resolve the results of various subdomains enumeration tools.☆72Updated last year
- ☆19Updated 4 years ago
- Collection of content discovery wordlists in one wordlist.☆38Updated 3 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Updated 4 years ago
- FockCache - Minimalized Test Cache Poisoning☆110Updated 5 years ago
- Tool to find SMTP servers vulnerable to open relay☆83Updated 5 years ago
- ☆53Updated 10 months ago
- A simple Bash one liner with aim to automate CRLF vulnerability scanning.☆69Updated 5 years ago
- ☆38Updated 4 years ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- Find the remote website version based on a git repository☆126Updated 4 years ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆46Updated 2 years ago
- My recon script☆50Updated 5 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 5 years ago
- Weaponizing Live CT logs for automated monitoring of assets☆134Updated 4 years ago
- Detect, manage and exploit Blind Cross-site scripting (XSS) vulnerabilities.☆40Updated 2 years ago
- Wordlists for intelligent directory brute-forcing☆32Updated 4 years ago
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆56Updated 5 years ago
- Bucket Flaws ( S3 Bucket Mass Scanner ): A Simple Lightweight Script to Check for Common S3 Bucket Misconfigurations☆58Updated 5 years ago
- Handy bash and python scripts for bug bounty hunting!☆47Updated 4 years ago
- Create wordlists from source codes files/directories for enumeration☆30Updated 2 years ago