skepticfx / subquestLinks
Fast, Elegant subdomain scanner using nodejs
☆33Updated 6 years ago
Alternatives and similar repositories for subquest
Users that are interested in subquest are comparing it to the libraries listed below
Sorting:
- A node utility to scan a domain with various techniques.☆12Updated 5 years ago
- A JavaScript clickjacking PoC generator☆24Updated 6 years ago
- Hunt Open MongoDB instances☆79Updated 6 years ago
- Fast browser-based network discovery module☆114Updated 4 years ago
- ☆60Updated 8 years ago
- Paskto - Passive Web Scanner☆151Updated 6 years ago
- Pown.js is a security testing an exploitation toolkit built on top of Node.js and NPM.☆261Updated 2 years ago
- Another web fuzzer written in NodeJS☆59Updated 7 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆41Updated 6 years ago
- A web crawler written with pentesting in mind and some hacks for smart crawling☆29Updated 6 years ago
- Simple, hand-picked list of fuzz strings☆34Updated 8 years ago
- A search engine for content shared publicly via cloud storage services☆101Updated last year
- Damn Small JS Scanner☆106Updated 4 years ago
- NodeXP - A Server Side Javascript Injection tool capable of detecting and exploiting Node.js vulnerabilities☆106Updated 9 months ago
- Tools to gather subdomains from Bug Bounty programs☆65Updated 7 years ago
- Advanced web server fingerprinting for Nmap☆131Updated 8 years ago
- Nodejs application intentionally vulnerable to SSRF☆42Updated 2 years ago
- A very simple bridge for performing Flash HTTP requests with JavaScript☆81Updated 10 years ago
- Single-threaded epoll-based concurrent bulk whois client☆32Updated 8 years ago
- Scan for vulnerabilities in JavaScript libraries you use (Python port of retirejs)☆51Updated 5 years ago
- XSS exploitation tool - access victims through HTTP proxy☆160Updated 11 years ago
- A tool for enumerating expired domains in CNAME records☆59Updated 9 years ago
- Archaeologit scans the history of a user's GitHub repositories for a given pattern to find sensitive things.☆143Updated 7 years ago
- Entropy is a (prototype) WAF driven by maths.☆56Updated 6 years ago
- #legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.☆72Updated 5 years ago
- Simple wrapper for meg that sieves through meg's output for you.☆60Updated 6 years ago
- HackerOne Public Disclosure Slack Bot☆20Updated 3 years ago
- A DNS connectback shell executed by strings in payloads.txt☆102Updated 2 years ago
- ☆79Updated 13 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 4 years ago