shdwpwn / rsescanView external linksLinks
RSEScan is a command-line utility for interacting with the RSECloud. It allows you to fetch subdomains and IPs from certificates for a given domain or organization.
☆17Jun 7, 2024Updated last year
Alternatives and similar repositories for rsescan
Users that are interested in rsescan are comparing it to the libraries listed below
Sorting:
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Dec 28, 2022Updated 3 years ago
- JIRA"YA is a vulnerability analyzer for JIRA instances. It runs active scans to identify vulnerabilities by interacting with the host and…☆41Aug 23, 2024Updated last year
- Exploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215☆17Nov 17, 2022Updated 3 years ago
- Hunt SSL Certificates for interesting keywords on major cloud service providers / internet☆40Nov 20, 2025Updated 2 months ago
- Exploit for elevation of privilege vulnerability in QuickHeal's Seqrite EPS (CVE-2023-31497).☆18Oct 30, 2023Updated 2 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆44Aug 9, 2023Updated 2 years ago
- Sonar is a security researcher's Swiss army knife for finding and exploiting vulnerabilities that require out-of-band interactions☆21Updated this week
- ☆37Nov 25, 2025Updated 2 months ago
- Azure Service Subdomain Enumeration☆71Sep 2, 2024Updated last year
- A user enumeration tool for Slack.☆35Jun 10, 2024Updated last year
- bash script for automating subdomain enumeration process either passive or active☆29Dec 17, 2024Updated last year
- Bash tool used for proactive detection of malicious activity on macOS systems.☆39Sep 29, 2025Updated 4 months ago
- This is the latest KLCiS Voucher System embedded portal for Omada cloud/hardware controller. With this, the client can now check their pu…☆17Mar 6, 2025Updated 11 months ago
- ☆14Dec 18, 2025Updated last month
- ☆34Apr 24, 2024Updated last year
- ☆33Jun 12, 2024Updated last year
- ☆25Jan 19, 2026Updated 3 weeks ago
- ☆30Jun 6, 2025Updated 8 months ago
- Auto script vps Tunneling for free ( multi port )☆11Feb 9, 2024Updated 2 years ago
- Modified version of PEAS client for offensive operations☆42Jan 16, 2023Updated 3 years ago
- ☆11Feb 24, 2025Updated 11 months ago
- Uzbek cyrillic/latin alphabetic, upper/lower/capital-case, name/surname/patronymic wordlists (dictionaries) and their combinations☆11Aug 4, 2022Updated 3 years ago
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectors☆14May 21, 2024Updated last year
- Retrieve all mails of users related to a git repository, a git user or a git organization☆58May 1, 2024Updated last year
- a BOF implementation of various registry persistence methods☆95Nov 11, 2025Updated 3 months ago
- ☆13Jul 20, 2024Updated last year
- A Deribit Trading System using C++ utilizing WebSocket that performs the following actions: Place an order Cancel an order Modify an ord…☆12Oct 2, 2025Updated 4 months ago
- A bridge to launch managed applications (.NET) into MS signed exe via dll injection☆13Aug 29, 2020Updated 5 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- ☆13Jan 8, 2024Updated 2 years ago
- TOOL - Unauthenticated Remote DNS , Scanner ranger IP.☆11Feb 18, 2015Updated 10 years ago
- Slack post-exploitation script for leaked bot tokens and "d" cookies☆16Nov 18, 2025Updated 2 months ago
- "Useable" tool to share secrets via shamir secret sharing and NaCL.☆14Sep 19, 2018Updated 7 years ago
- ☆16Dec 7, 2025Updated 2 months ago
- ☆15May 31, 2025Updated 8 months ago
- This is useful if you are running an investigation to determine the usage of the same username on different social networks.☆12Dec 10, 2020Updated 5 years ago
- ☆14May 20, 2019Updated 6 years ago
- Google Workspace password sprayer with anti-captcha☆14Nov 15, 2025Updated 2 months ago
- The Tool will fetch the article links for you, based on your query. Enter anything you want to search, whether a vulnerability descriptio…☆10Jan 2, 2021Updated 5 years ago