safebuffer / takeoveritLinks
Simple And Fast Subdomain Take Over Checker
☆9Updated 6 years ago
Alternatives and similar repositories for takeoverit
Users that are interested in takeoverit are comparing it to the libraries listed below
Sorting:
- edge --> powerpoint --> remote-file --> shell☆12Updated 6 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Updated 5 years ago
- Whitepass Bypass Whitelist/Ratelimit Implementations in Web Applications/APIs☆26Updated 4 years ago
- Telegram notification for metasploit sessions.☆14Updated 6 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Updated 4 years ago
- ☆17Updated 5 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 6 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Updated 4 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 5 years ago
- A wrap up script to auto perform nmap scan from the result of dnsrecon, then output result with filename as hostname and ip☆11Updated 6 years ago
- Miscellaneous exploit scripts☆17Updated 3 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆42Updated 7 years ago
- A tool written in python for scraping firebase data☆43Updated 5 years ago
- Python driver for Wappalyzer, a web application detection utility.☆10Updated 5 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆101Updated 5 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Create wordlists from source codes files/directories for enumeration☆30Updated 2 years ago
- My public exploit collection.☆31Updated 6 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 5 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆17Updated 7 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated last year
- The Python Password-Protected Obfuscator☆34Updated 6 years ago
- Dynamic Callbacks can be used for re-establishing communication with C2 infrastructure and for achieving persistence by using different m…☆15Updated 6 years ago
- Scripts for OSCE☆18Updated 6 years ago
- URLScan Go API client☆7Updated 4 years ago
- An0n 3xPloiTeR Shell☆35Updated 5 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago