tobiasasa / crtsh_subLinks
Extracción de subdominios utilizando el servicio de crt.sh, comprobando los certificados TLS/SSL registrados del dominio.
☆16Updated last year
Alternatives and similar repositories for crtsh_sub
Users that are interested in crtsh_sub are comparing it to the libraries listed below
Sorting:
- wp-config-scan☆81Updated 2 years ago
- Msfvenom Advanced Obfuscated Payload Builder.☆32Updated 7 months ago
- Monta tu laboratorio para preparar la certificación eCPPT☆19Updated 2 years ago
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆55Updated last year
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆257Updated 9 months ago
- Scripts for offensive security☆178Updated 7 months ago
- A comprehensive automation script for penetration testing and reconnaissance.☆43Updated last year
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆55Updated last year
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆177Updated last year
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆145Updated last year
- Command generator for pentesting tools☆16Updated last year
- Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured sys…☆47Updated last year
- This is a cheatsheet of commands and processes to compromise an Active Directory environment. Everything documented in this repository is…☆22Updated 8 months ago
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆157Updated 2 months ago
- Vault de Obsidian Apuntes BSCP (Suscribete a Kr4k3nEU chaval)☆19Updated last year
- Herramienta para detectar correos de phishing mediante análisis DKIM, SPF, y WHOIS☆32Updated last year
- Maximize your bug bounty hunting efficiency with exp0s3d - the open-source tool that automates initial reconnaissance and vulnerability d…☆82Updated 10 months ago
- Personal CheatSheet used for the exam made with Obsidian, download the repo and use the resources within Obsidian for a better experience…☆45Updated 2 years ago
- Herramienta para escanear y listar dispositivos activos en la red local sin obtener tanta información como en NMAP y sin tener que saber…☆29Updated last year
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆299Updated 2 years ago
- 🦝 Herramienta de anonimato extremo para Kali Linux. Cambia MAC, VPN, Tor, DNS, Restablece y limpia logs.☆58Updated 9 months ago
- ⚡ XSSuccessor is a powerful, asynchronous Cross-Site Scripting (XSS) detection tool.☆55Updated last year
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆225Updated 5 months ago
- Máquina virtual educativa que simula los sistemas usados por una empresa eléctrica: control de consumo, monitoreo industrial y cibersegur…☆45Updated 3 months ago
- Househole prioritizes privacy, security, and control, while helping users remain undetected by services that identify temporary emails.☆34Updated last year
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆240Updated last year
- ☆27Updated last year
- Todos los comandos necesarios para aprobar el eJPT☆12Updated 4 years ago
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆166Updated 10 months ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆131Updated last year