umutcamliyurt / SubhunterView external linksLinks
A fast subdomain takeover tool
☆85Nov 10, 2023Updated 2 years ago
Alternatives and similar repositories for Subhunter
Users that are interested in Subhunter are comparing it to the libraries listed below
Sorting:
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated 11 months ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆34Feb 20, 2024Updated last year
- keep watching new bug bounty (vulnerability) postings.☆13Apr 7, 2024Updated last year
- A BurpSuite extension for vulnerability Scanning☆28Feb 16, 2024Updated last year
- Url scrapper or extractor from alienvault☆37Mar 1, 2025Updated 11 months ago
- Advanced Time-based Blind SQL Injection fuzzer for HTTP Headers☆309Mar 31, 2024Updated last year
- Resources for Mobile Application Testing 📓☆74Mar 30, 2024Updated last year
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆63Feb 22, 2025Updated 11 months ago
- SpeedyTest☆17Jun 21, 2023Updated 2 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- ☆56Jan 22, 2025Updated last year
- A utility for detecting webpage inputs and conducting XSS scans.☆160May 5, 2024Updated last year
- ☆47Mar 5, 2025Updated 11 months ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 2 years ago
- ParamScan is a chrome extension for finding reflected parameters in a webpage.☆92Jan 11, 2025Updated last year
- All-in Fuzzer. Burp suite extension for auto fuzzing params, headers, body☆36Dec 13, 2025Updated 2 months ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- Official Kali Linux tool to check all urls of a domain for SQL injections :)☆370Jun 2, 2024Updated last year
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆27Dec 23, 2025Updated last month
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Aug 14, 2025Updated 6 months ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆57Apr 16, 2024Updated last year
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆51Nov 5, 2025Updated 3 months ago
- Yet Another Mac Changer!!!☆12Jan 26, 2023Updated 3 years ago
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆355Dec 14, 2023Updated 2 years ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆77May 16, 2024Updated last year
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 10 months ago
- LazyHunter is an automated reconnaissance tool designed for bug hunters, leveraging Shodan's InternetDB and CVEDB APIs☆233Apr 5, 2025Updated 10 months ago
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- BackdoorSim: An Educational into Remote Administration Tools☆119Feb 7, 2024Updated 2 years ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆52May 26, 2024Updated last year
- Automated tool for domains & Subdomains Gathering☆14Feb 25, 2024Updated last year
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- Burp Suite extension to decrypt/encrypt any encrypted traffic (AES/RSA/Encodings and more) with custom code in any language☆221Jan 9, 2026Updated last month
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆154Sep 23, 2025Updated 4 months ago
- Unauthorized Docker Exploitation Tool☆37Dec 24, 2023Updated 2 years ago
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated last year
- A windows Wifi Brute forcing utility which is an extremely old method but still works without the requirement of external dependencies.☆79Jul 13, 2024Updated last year
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Dec 14, 2023Updated 2 years ago
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆41Oct 18, 2023Updated 2 years ago