utkusen / socialhunterLinks
crawls the website and finds broken social media links that can be hijacked
β752Updated 11 months ago
Alternatives and similar repositories for socialhunter
Users that are interested in socialhunter are comparing it to the libraries listed below
Sorting:
- γπγA tool used to hunt down API key leaks in JS files and pagesβ817Updated 3 months ago
- A command-line utility designed to discover URLs for a given domain in a simple, efficient way. It works by gathering information from a β¦β665Updated 3 weeks ago
- β623Updated 2 weeks ago
- A Powerful Sensor Tool to discover login panels, and POST Form SQLi Scanningβ526Updated 2 years ago
- Dome - Subdomain Enumeration Tool. Fast and reliable python script that makes active and/or passive scan to obtain subdomains and search β¦β538Updated last year
- β‘·β πππππ ππΈβ β’Ύ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)β914Updated 7 months ago
- jsleak is a tool to find secret , paths or links in the source code during the recon.β571Updated 3 months ago
- A collection of one-liners for bug bounty hunting.β1,417Updated 11 months ago
- MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilitieβ¦β1,019Updated last year
- Find subdomains with GPT, for freeβ348Updated last year
- β410Updated 3 years ago
- Simple Google Dorks search toolβ309Updated 3 months ago
- Useful Google Dorks for WebSecurity and Bug Bountyβ1,149Updated last year
- Weaponizing WaybackUrls for Recon, BugBounties , OSINT, Sensitive Endpoints and what notβ507Updated last month
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,β732Updated last year
- An OSINT tool that helps detect members of a company with leaked credentialsβ761Updated 10 months ago
- An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.β741Updated 2 years ago
- Try to find the origin IP of a webapp protected by Cloudflare.β354Updated last year
- Automated Recon for Pentesting & Bug Bountyβ431Updated last month
- The fastest dork scanner written in Go.β1,268Updated last year
- Little Bug Bounty & Hacking ToolsβοΈβ368Updated last year
- Small tool to Grab subdomains using Shodan api.β522Updated 4 months ago
- hakip2host takes a list of IP addresses via stdin, then does a series of checks to return associated domain names.β452Updated 3 years ago
- Golang client for querying SecurityTrails API dataβ575Updated 2 years ago
- Fast and customizable subdomain wordlist generator using DSLβ903Updated 3 weeks ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!β972Updated last year
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and eβ¦β380Updated 2 years ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bountyβ707Updated 7 months ago
- Simple python script supported with BurpBouty profile that helps you to detect SQL injection "Error based" by sending multiple requests wβ¦β628Updated 2 weeks ago
- An XSS exploitation command-line interface and payload generator.β1,405Updated 11 months ago