tobiasasa / crtsh_sub
Extracción de subdominios utilizando el servicio de crt.sh, comprobando los certificados TLS/SSL registrados del dominio.
☆16Updated 3 months ago
Alternatives and similar repositories for crtsh_sub:
Users that are interested in crtsh_sub are comparing it to the libraries listed below
- Monta tu laboratorio para preparar la certificación eCPPT☆18Updated last year
- wp-config-scan☆79Updated last year
- A comprehensive automation script for penetration testing and reconnaissance.☆35Updated 8 months ago
- Msfvenom Advanced Obfuscated Payload Builder.☆24Updated 2 months ago
- Tor Relay Searcher is a Python script that uses the Onionoo TOR API to filter by relay tags.☆9Updated 10 months ago
- Herramienta para escanear y listar dispositivos activos en la red local sin obtener tanta información como en NMAP y sin tener que saber…☆22Updated 8 months ago
- Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured sys…☆43Updated 9 months ago
- Proxmark guide☆14Updated 2 months ago
- Personal CheatSheet used for the exam made with Obsidian, download the repo and use the resources within Obsidian for a better experience…☆45Updated 2 years ago
- Todos los comandos necesarios para aprobar el eJPT☆11Updated 3 years ago
- ☆25Updated 9 months ago
- PenKraken, herramienta de automatizacion de hacking Etico / Pentesting☆10Updated 10 months ago
- Enhance Your Active Directory Spraying with User Information.☆16Updated 2 months ago
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆53Updated 4 months ago
- Herramienta para detectar correos de phishing mediante análisis DKIM, SPF, y WHOIS☆28Updated 8 months ago
- Command generator for pentesting tools☆16Updated 4 months ago
- RSA cryptosystem implementation in Python.☆10Updated 10 months ago
- Herramienta para hacking wifi con múltiples opciones.☆32Updated 8 months ago
- ☆18Updated 4 months ago
- Config files for my GitHub profile.☆16Updated 2 weeks ago
- 🦝 Herramienta de anonimato extremo para Kali Linux. Cambia MAC, VPN, Tor, DNS, Restablece y limpia logs.☆48Updated last week
- Despliega un entorno de hacking profesional para Kali Linux ejecutando solo un script.☆64Updated last week
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆147Updated 11 months ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆121Updated 7 months ago
- Bash script that perform all the setup for BSPWM installation, including polybar, picom, pywal,nvchad, with multiple color schemes and a …☆29Updated 4 months ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆111Updated 4 months ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆244Updated 2 weeks ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆127Updated 3 months ago
- Househole prioritizes privacy, security, and control, while helping users remain undetected by services that identify temporary emails.☆30Updated 7 months ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆62Updated 6 months ago