Extracción de subdominios utilizando el servicio de crt.sh, comprobando los certificados TLS/SSL registrados del dominio.
☆16Dec 30, 2024Updated last year
Alternatives and similar repositories for crtsh_sub
Users that are interested in crtsh_sub are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Herramienta para detectar correos de phishing mediante análisis DKIM, SPF, y WHOIS☆32Aug 13, 2024Updated last year
- Script en bash de Nmap que se puede personalizar para ajustar el escaneo a tus necesidades.☆13Jul 20, 2024Updated last year
- MalDev & AV-EDR Evasion for Pentesters☆20Feb 17, 2023Updated 3 years ago
- reverse shell, Bypass windows defender firewall☆46Nov 13, 2024Updated last year
- Argument injection vulnerability in PHP☆13Jun 15, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆55Jan 28, 2025Updated last year
- ¿Sospechas que un archivo podría contener información oculta o maliciosa? Ésta herramienta de análisis avanzado escanea PDFs, documentos …☆21Apr 2, 2025Updated 11 months ago
- Keylogger for Windows that goes unnoticed by the antivirus☆31Dec 4, 2024Updated last year
- Herramienta para escanear y listar dispositivos activos en la red local sin obtener tanta información como en NMAP y sin tener que saber…☆27Aug 12, 2024Updated last year
- Command generator for pentesting tools☆17Dec 2, 2024Updated last year
- Discover WAF bypass vectors for any payload on any HTTP method, the civilized way.☆23May 3, 2025Updated 10 months ago
- A tool designed to analyse email headers☆40Oct 4, 2022Updated 3 years ago
- Datasets for cybersecurity☆16Aug 12, 2025Updated 7 months ago
- Este script es una herramienta avanzada diseñada para administrar, crear y personalizar máquinas virtuales en entornos Docker, especialme…☆17Feb 2, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Herramienta para hacking wifi con múltiples opciones.☆45Aug 12, 2024Updated last year
- backdoor exploit for vsftpd 2.3.4 on python☆16Oct 14, 2023Updated 2 years ago
- Traceability in blockchain (ethereum and binance for now)☆19Nov 9, 2024Updated last year
- Herramienta para spamear correos electrónicos creada con Python y SMTP, se necesita un correo electrónico de Outlook para poder usar la h…☆16May 1, 2023Updated 2 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Aug 31, 2022Updated 3 years ago
- ☆12Aug 31, 2020Updated 5 years ago
- Fuzz 403/401ing endpoints for bypasses☆10Aug 14, 2020Updated 5 years ago
- CVE-2024-28995 POC Vulnerability Scanner☆13Jun 15, 2024Updated last year
- Househole prioritizes privacy, security, and control, while helping users remain undetected by services that identify temporary emails.☆34Sep 21, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- This is a simple CSRF Proof of Concept generator that supports multiple form encodings and methods☆33Jul 9, 2017Updated 8 years ago
- Adapted PE Loader to load a rc4 encrypted mimikatz shellcode into memory with specified arguments before exiting.☆16Jun 2, 2025Updated 9 months ago
- Listed below are some extra phishing scenarios for wifiphisher these scenarios are only added to provide security awareness. It may not b…☆15Jul 3, 2017Updated 8 years ago
- ☆37Feb 21, 2026Updated last month
- Todos los comandos necesarios para aprobar el eJPT☆13Sep 28, 2021Updated 4 years ago
- Linux port scan detector☆13Nov 20, 2017Updated 8 years ago
- Mattermost is an open source platform for secure collaboration across the entire software development lifecycle..☆27Oct 20, 2025Updated 5 months ago
- A comprehensive automation script for penetration testing and reconnaissance.☆43Jul 29, 2024Updated last year
- ☆21Dec 2, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Car Hacking Toolkit☆13Oct 15, 2021Updated 4 years ago
- 🇪🇸 Los dotfiles de mi entorno en ARCH orientado a PENTESTING, con un autoinstalador. ¡Funciona en Nativo y MV! 🇬🇧 My ARCH dotfiles…☆15Jun 25, 2023Updated 2 years ago
- Secrets Find0r is a multithreaded SMB share crawler that hunts for exposed credentials and secrets across Windows networks. It enumerates…☆67Oct 20, 2025Updated 5 months ago
- Burp Suite Professional Edition .☆19Jul 24, 2025Updated 8 months ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Feb 4, 2022Updated 4 years ago
- Python Script to automate Dorking!!☆13Dec 20, 2021Updated 4 years ago
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆44Feb 24, 2025Updated last year