trickest / mksubLinks
Generate tens of thousands of subdomain combinations in a matter of seconds
☆270Updated last year
Alternatives and similar repositories for mksub
Users that are interested in mksub are comparing it to the libraries listed below
Sorting:
- Gotator is a tool to generate DNS wordlists through permutations.☆478Updated 2 years ago
- Filter and enrich a list of subdomains by level☆205Updated last year
- Automated learning of regexes for DNS discovery☆369Updated 2 years ago
- ☆158Updated 2 years ago
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆183Updated 2 years ago
- Nuclei templates written by us.☆271Updated 3 years ago
- Make URL path combinations using a wordlist☆174Updated last year
- ☆294Updated 2 years ago
- This Burp Suite extension allows for the automatic creation and deletion of an upstream SOCKS5 proxy on popular cloud services.☆243Updated 2 months ago
- ☆154Updated 2 years ago
- Burpsuite plugin for Interact.sh☆222Updated 11 months ago
- Burp extension to create target specific and tailored wordlist from burp history.☆239Updated 3 years ago
- Full Nuclei automation script with logic explanation.☆245Updated 3 years ago
- A replacement of "qsreplace", accepts URLs as standard input, replaces all query string values with user-supplied values and stdout.☆105Updated 3 years ago
- De-clutter a list of URLs☆341Updated 6 months ago
- A reverse whois tool based on Whoxy API.☆167Updated last year
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆312Updated 6 months ago
- Fast CLI tool to find the parameters that can be used to find SSRF or Out-of-band resource load☆296Updated 8 months ago
- Find endpoints on GitHub.☆197Updated 2 years ago
- Prototype pollution scanner using headless chrome☆218Updated 2 years ago
- Fast and customizable vulnerability scanner For JIRA written in Python☆320Updated 5 months ago
- This is a python wrapper around the amazing KNOXSS API by Brute Logic☆271Updated last week
- Finding XSS during recon☆260Updated 2 years ago
- Discover new target domains using Content Security Policy☆445Updated 3 weeks ago
- Secret and/or credential patterns used for gf.☆240Updated 2 years ago
- hakip2host takes a list of IP addresses via stdin, then does a series of checks to return associated domain names.☆447Updated 3 years ago
- Fleex makes it easy to create multiple VPS on cloud providers and use them to distribute workloads.☆262Updated 9 months ago
- Domains belonging to the most reputed public bug bounty programs. [NOT FOR NON-MONETARY OR PRIVATE PROGRAMS]☆216Updated 9 months ago
- IP Lookups for Open Ports and Vulnerabilities from internetdb.shodan.io☆129Updated 3 years ago
- Smart context-based SSRF vulnerability scanner.☆351Updated 3 years ago