safebuffer / takeoverit
Simple And Fast Subdomain Take Over Checker
☆9Updated 6 years ago
Alternatives and similar repositories for takeoverit
Users that are interested in takeoverit are comparing it to the libraries listed below
Sorting:
- edge --> powerpoint --> remote-file --> shell☆12Updated 5 years ago
- URLScan Go API client☆7Updated 4 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Updated 4 years ago
- LaravelN00b .env Scanner☆39Updated 5 years ago
- Whitepass Bypass Whitelist/Ratelimit Implementations in Web Applications/APIs☆26Updated 4 years ago
- Go module for striping CDN IP ranges.☆24Updated 5 years ago
- A Mozilla Firefox extension which allows quick access to your google-dorking result☆19Updated 4 years ago
- Basic XSS Scanner☆11Updated 4 years ago
- Cloudflare Bypass Script☆22Updated 5 years ago
- Telegram notification for metasploit sessions.☆14Updated 6 years ago
- an ancient irc botnet☆12Updated 10 years ago
- Dashboard/API + DNS/HTTP Servers to identify Out of Band Resolution in Payloads☆38Updated 3 years ago
- Zippo is a archive payload generator for testing XSS, (Zip/Tar/Gzip) slip vulnerabilities.☆25Updated 4 years ago
- wifiDOS with scapy☆16Updated 9 years ago
- Pentesting Pratic Notes☆15Updated 3 years ago
- ☆92Updated 2 years ago
- ☆56Updated 7 years ago
- A tool written in python for scraping firebase data☆42Updated 5 years ago
- An Extended, Modulair, Host Discovery Framework☆43Updated 6 years ago
- CVE-2018-11311 | mySCADA myPRO 7 Hardcoded FTP Username and Password Vulnerability☆11Updated 6 years ago
- ☆14Updated 3 years ago
- 0x94TR Burp Extension - Java version☆30Updated 4 years ago
- [Exploit] vBulletin 5.1.x - PreAuth Remote Code Execution☆19Updated 3 years ago
- Brute-force script for finding azorult XOR key.☆14Updated 5 years ago
- Automated Google dorking with custom search engines☆27Updated 5 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Updated 7 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆17Updated 6 years ago
- Traverse JS files for APIs/Endpoints☆15Updated 10 years ago
- Create wordlists from source codes files/directories for enumeration☆30Updated last year
- ☆12Updated last year