☆32Apr 16, 2025Updated 10 months ago
Alternatives and similar repositories for SubScan
Users that are interested in SubScan are comparing it to the libraries listed below
Sorting:
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- ☆14Nov 8, 2024Updated last year
- Program to Inject a DLL into a process from memory.☆13Mar 16, 2024Updated last year
- Recon (Whois)☆15May 25, 2023Updated 2 years ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆18Aug 7, 2024Updated last year
- SubCortex is a fast and efficient tool for passive subdomain enumeration. It aggregates subdomain data from multiple APIs, helping penetr…☆16Jul 10, 2025Updated 7 months ago
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆13Nov 1, 2024Updated last year
- CVE-2021-21972 Unauthorized RCE in VMware vCenter metasploit exploit script☆20Mar 7, 2021Updated 4 years ago
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆63Feb 22, 2025Updated last year
- SQLMap with Autonomous AI, phased workflows, RAG memory, and MCP Agent Tools☆28Updated this week
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆23Feb 17, 2024Updated 2 years ago
- ☆25May 29, 2025Updated 8 months ago
- ☆18Oct 8, 2024Updated last year
- An advanced JWT extraction & decoding tool for bug bounty hunters! 🏴☠️☆45Mar 24, 2025Updated 11 months ago
- ☆24Mar 22, 2025Updated 11 months ago
- automated tool designed to streamline the search and identification of Proofs of Concept (POCs)☆20Apr 30, 2024Updated last year
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆80Nov 24, 2025Updated 3 months ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆75Jan 6, 2026Updated last month
- A passive way to find backups/ sensitive information.☆87Jul 10, 2025Updated 7 months ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆125Dec 17, 2024Updated last year
- Subdomain Takeover lab is FREE for everyone. This means here is a legal to takeover Subdomain of this website. Here you'll find more tha…☆24Jan 1, 2025Updated last year
- Awesome DNS Security is a curated list of tools, best practices, and resources focused on securing DNS infrastructure.☆22Oct 11, 2024Updated last year
- Mockingjay Process Injection Vulnerable DLL Finder☆19Jun 30, 2023Updated 2 years ago
- A tool for fetching DFIR and other GitHub tools.☆25Aug 2, 2025Updated 6 months ago
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- ReGen is a utility tool simplifying Regex creation by selecting values from logs or text. It enhances efficiency for digital forensics, d…☆20Aug 11, 2023Updated 2 years ago
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser au…☆92Nov 26, 2024Updated last year
- Nothing special --- Some resources to save my time☆20Aug 14, 2020Updated 5 years ago
- HydrAttack PoC eMail Spoofer Module is designed to test the security posture of a domain against email spoofing attacks. It performs step…☆30Jul 10, 2025Updated 7 months ago
- ZoomBotC2 is a stealthy Command and Control (C2) framework that leverages Zoom's API endpoints for covert communication between implants …☆56Jun 30, 2025Updated 7 months ago
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Th…☆262Jul 6, 2025Updated 7 months ago
- PyBurp is a Burp Suite extension that provides predefined Python functions for HTTP/WebSocket traffic modification, context menu registra…☆38Dec 28, 2025Updated last month
- ☆14Dec 18, 2025Updated 2 months ago
- Passive Web Vulnerability Detection Tool☆37May 5, 2025Updated 9 months ago
- Tests your API automatically for common API vulnerabilities. Project is still Work In Progress. PRs are appreciated.☆34Apr 12, 2024Updated last year
- Active monitoring bug bounty programs tool☆47Jan 21, 2026Updated last month
- ☆35Mar 28, 2025Updated 10 months ago
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆32Jul 21, 2024Updated last year
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆42Apr 7, 2025Updated 10 months ago