tobiasasa / crtsh_subLinks
Extracción de subdominios utilizando el servicio de crt.sh, comprobando los certificados TLS/SSL registrados del dominio.
☆16Updated 6 months ago
Alternatives and similar repositories for crtsh_sub
Users that are interested in crtsh_sub are comparing it to the libraries listed below
Sorting:
- wp-config-scan☆80Updated last year
- Monta tu laboratorio para preparar la certificación eCPPT☆18Updated 2 years ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆252Updated 3 months ago
- Msfvenom Advanced Obfuscated Payload Builder.☆24Updated last month
- A comprehensive automation script for penetration testing and reconnaissance.☆37Updated 11 months ago
- ☆25Updated last year
- Personal CheatSheet used for the exam made with Obsidian, download the repo and use the resources within Obsidian for a better experience…☆45Updated 2 years ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆172Updated last year
- Una colección de mini apps vulnerables desarrolladas en Python con Flask. Cada vulnerabilidad incluye tanto el código vulnerable como su …☆15Updated 2 months ago
- Tor Relay Searcher is a Python script that uses the Onionoo TOR API to filter by relay tags.☆9Updated last year
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆295Updated last year
- Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials.☆322Updated 2 months ago
- Command generator for pentesting tools☆16Updated 7 months ago
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆53Updated 6 months ago
- Todos los comandos necesarios para aprobar el eJPT☆11Updated 3 years ago
- ☆313Updated last year
- 🦝 Herramienta de anonimato extremo para Kali Linux. Cambia MAC, VPN, Tor, DNS, Restablece y limpia logs.☆58Updated 3 months ago
- Bash script that perform all the setup for BSPWM installation, including polybar, picom, pywal,nvchad, with multiple color schemes and a …☆30Updated last month
- ☆19Updated 2 months ago
- Automation tool to testing and confirm the xss vulnerability.☆272Updated 3 months ago
- Herramienta para detectar correos de phishing mediante análisis DKIM, SPF, y WHOIS☆31Updated 11 months ago
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Th…☆255Updated last week
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆125Updated 10 months ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆132Updated 6 months ago
- Househole prioritizes privacy, security, and control, while helping users remain undetected by services that identify temporary emails.☆32Updated 9 months ago
- Herramienta para escanear y listar dispositivos activos en la red local sin obtener tanta información como en NMAP y sin tener que saber…☆22Updated 11 months ago
- ⚡ XSSuccessor is a powerful, asynchronous Cross-Site Scripting (XSS) detection tool.☆56Updated 6 months ago
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆236Updated 10 months ago
- Scripts for offensive security☆137Updated last month
- Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured sys…☆46Updated 11 months ago