utkusen / socialhunter
crawls the website and finds broken social media links that can be hijacked
☆728Updated 2 months ago
Alternatives and similar repositories for socialhunter:
Users that are interested in socialhunter are comparing it to the libraries listed below
- An OSINT tool that helps detect members of a company with leaked credentials☆577Updated last month
- A collection of one-liners for bug bounty hunting.☆1,296Updated 2 months ago
- jsleak is a tool to find secret , paths or links in the source code during the recon.☆521Updated 2 months ago
- Dome - Subdomain Enumeration Tool. Fast and reliable python script that makes active and/or passive scan to obtain subdomains and search …☆528Updated last year
- ☆612Updated 7 months ago
- MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilitie…☆938Updated 8 months ago
- A command-line utility designed to discover URLs for a given domain in a simple, efficient way. It works by gathering information from a …☆592Updated this week
- A Powerful Sensor Tool to discover login panels, and POST Form SQLi Scanning☆484Updated last year
- Automated Recon for Pentesting & Bug Bounty☆421Updated last year
- Small tool to Grab subdomains using Shodan api.☆426Updated 5 months ago
- Find subdomains with GPT, for free☆337Updated 11 months ago
- ☆346Updated 3 years ago
- An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.☆597Updated last year
- oneliner commands for bug bounties☆439Updated 2 years ago
- ⡷⠂𝚔𝚊𝚛𝚖𝚊 𝚟𝟸⠐⢾ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)☆847Updated 9 months ago
- Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal & Intelligence X!☆1,983Updated last week
- Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more☆1,635Updated 2 weeks ago
- A Bash script and Docker image for Bug Bounty reconnaissance. Intended for headless use.☆896Updated last year
- Try to find the origin IP of a webapp protected by Cloudflare.☆341Updated 7 months ago
- Real-world infosec wordlists, updated regularly☆1,470Updated this week
- The fastest dork scanner written in Go.☆1,182Updated last year
- A repository that includes all the important wordlists used while bug hunting.☆1,273Updated 2 years ago
- 「🔑」A tool used to hunt down API key leaks in JS files and pages☆684Updated last week
- Awesome Bug bounty builder Project☆655Updated 2 years ago
- 403/401 Bypass Methods + Bash Automation + Your Support ;)☆1,430Updated 2 years ago
- An XSS exploitation command-line interface and payload generator.☆1,348Updated 2 months ago
- Fast and customizable subdomain wordlist generator using DSL☆779Updated 2 weeks ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆350Updated last year
- Shodan Dorks☆456Updated last year
- Useful Google Dorks for WebSecurity and Bug Bounty☆1,075Updated 11 months ago