trickest / mksubLinks
Generate tens of thousands of subdomain combinations in a matter of seconds
☆274Updated 2 years ago
Alternatives and similar repositories for mksub
Users that are interested in mksub are comparing it to the libraries listed below
Sorting:
- Make URL path combinations using a wordlist☆171Updated 2 years ago
- Filter and enrich a list of subdomains by level☆210Updated 2 years ago
- ☆174Updated last month
- This Burp Suite extension allows for the automatic creation and deletion of an upstream SOCKS5 proxy on popular cloud services.☆246Updated 9 months ago
- ☆157Updated 2 years ago
- A replacement of "qsreplace", accepts URLs as standard input, replaces all query string values with user-supplied values and stdout.☆109Updated 3 years ago
- Find endpoints on GitHub.☆212Updated 2 years ago
- Automated learning of regexes for DNS discovery☆383Updated 2 years ago
- Nuclei templates written by geeknik. Claude is my co-pilot. 🤖☆290Updated 5 months ago
- Jeeves SQLI Finder☆218Updated 3 years ago
- Burpsuite plugin for Interact.sh☆229Updated last year
- Gotator is a tool to generate DNS wordlists through permutations.☆505Updated 3 years ago
- ☆300Updated 3 years ago
- Full Nuclei automation script with logic explanation.☆245Updated 3 years ago
- ☆249Updated 4 years ago
- Useful "Match and Replace" burpsuite rules☆360Updated 2 years ago
- Fast CLI tool to find the parameters that can be used to find SSRF or Out-of-band resource load☆296Updated last year
- Prototype pollution scanner using headless chrome☆219Updated 3 years ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆325Updated 5 months ago
- Js File Scanner☆169Updated 4 years ago
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆191Updated 3 years ago
- Fleex makes it easy to create multiple VPS on cloud providers and use them to distribute workloads.☆263Updated last year
- IP Lookups for Open Ports and Vulnerabilities from internetdb.shodan.io☆131Updated 3 years ago
- De-clutter a list of URLs☆377Updated 3 months ago
- Use favicons to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.☆222Updated last week
- Check AWS S3 instances for read/write/delete access☆121Updated 3 years ago
- Finding XSS during recon☆271Updated 3 years ago
- Domains belonging to the most reputed public bug bounty programs. [NOT FOR NON-MONETARY OR PRIVATE PROGRAMS]☆224Updated last year
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆299Updated 2 years ago
- Enumerate Subdomains Through Google Dorks (Bypassed Page Filter)☆125Updated 6 months ago