trickest / mksubLinks
Generate tens of thousands of subdomain combinations in a matter of seconds
☆273Updated 2 years ago
Alternatives and similar repositories for mksub
Users that are interested in mksub are comparing it to the libraries listed below
Sorting:
- Make URL path combinations using a wordlist☆171Updated 2 years ago
- Filter and enrich a list of subdomains by level☆211Updated 2 years ago
- ☆170Updated last week
- ☆157Updated 2 years ago
- Burpsuite plugin for Interact.sh☆228Updated last year
- Nuclei templates written by geeknik. Claude is my co-pilot. 🤖☆286Updated 3 months ago
- ☆297Updated 3 years ago
- Full Nuclei automation script with logic explanation.☆245Updated 3 years ago
- Gotator is a tool to generate DNS wordlists through permutations.☆497Updated 3 years ago
- This Burp Suite extension allows for the automatic creation and deletion of an upstream SOCKS5 proxy on popular cloud services.☆245Updated 8 months ago
- Automated learning of regexes for DNS discovery☆379Updated 2 years ago
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆191Updated 3 years ago
- Find endpoints on GitHub.☆207Updated 2 years ago
- Prototype pollution scanner using headless chrome☆219Updated 3 years ago
- hakip2host takes a list of IP addresses via stdin, then does a series of checks to return associated domain names.☆452Updated 3 years ago
- A path-normalization pentesting tool.☆135Updated 2 months ago
- Useful "Match and Replace" burpsuite rules☆352Updated 2 years ago
- Go script for bypassing 403 forbidden☆158Updated 4 years ago
- ☆249Updated 4 years ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆323Updated 4 months ago
- Fast CLI tool to find the parameters that can be used to find SSRF or Out-of-band resource load☆297Updated last year
- Use favicons to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.☆222Updated 3 weeks ago
- A replacement of "qsreplace", accepts URLs as standard input, replaces all query string values with user-supplied values and stdout.☆109Updated 3 years ago
- De-clutter a list of URLs☆371Updated last month
- Smart context-based SSRF vulnerability scanner.☆361Updated 3 years ago
- Domains belonging to the most reputed public bug bounty programs. [NOT FOR NON-MONETARY OR PRIVATE PROGRAMS]☆224Updated last year
- Jeeves SQLI Finder☆219Updated 3 years ago
- Build your own reconnaissance system with Osmedeus Next Generation☆200Updated 3 months ago
- Fast and customizable vulnerability scanner For JIRA written in Python☆345Updated 10 months ago
- Finding XSS during recon☆268Updated 3 years ago