who0xac / SubHunterXLinks
**SubHunterX** is an automated tool for subdomain enumeration, vulnerability scanning, and exploitation. It discovers subdomains, detects live hosts, fuzzes directories, scans ports, identifies vulnerabilities, and automates exploitation. Ideal for penetration testers and bug bounty hunters. Comprehensive recon in one script.
☆31Updated 5 months ago
Alternatives and similar repositories for SubHunterX
Users that are interested in SubHunterX are comparing it to the libraries listed below
Sorting:
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆207Updated last month
- ☆145Updated 6 months ago
- AI/LLM local model integration for analysis of reconftw results☆83Updated 5 months ago
- Advanced CORS Header Checker Tool with Vulnerability Detection and Bypass Attempts☆63Updated 4 months ago
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆150Updated last year
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆226Updated 2 weeks ago
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆151Updated last week
- Backup Files Wordlist Generator - generate a comprehensive list of potential backup file Wordlist based on a given list URL and backup fi…☆82Updated 3 months ago
- ☆69Updated 4 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆176Updated last week
- ☆153Updated last year
- SubOwner - A Simple tool check for subdomain takeovers.☆115Updated 11 months ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆123Updated 9 months ago
- Recon MindMap (RMM)☆163Updated last year
- ☆182Updated 11 months ago
- 🤖 LLM-powered agent for automated Google Dorking in bug hunting & pentesting.☆74Updated this week
- CLI tool to scan URLs for suspicious keywords, extensions, paths, and hidden files.☆47Updated 4 months ago
- Here are some cool and some unpublished Dorks☆79Updated 8 months ago
- The Most Advanced Client-Side Prototype Pollution Scanner☆239Updated last week
- GarudRecon automates domain recon with top open-source tools to discover assets, enumerate subdomains, and detect XSS, SQLi, LFI, RCE & m…☆133Updated this week
- Search for sensitive data in Postman public library.☆213Updated last month
- A passive way to find backups/ sensitive information.☆88Updated 2 months ago
- GBounty is a multi-step website vulnerability scanner developed in Golang designed to help companies, pentesters, and bug hunters identif…☆147Updated last month
- ☆124Updated last month
- ☆105Updated last year
- Parse FFUF results in GUI with option to sort based by response code , size , keyword☆98Updated last year
- A Go-based utility that processes input through multiple AI models concurrently (OpenAI, Claude, and Gemini) and provides a summarized co…☆86Updated 3 months ago
- Subdomain Enumerator and Simple Crawler☆152Updated last month
- Gather results of dorks across a number of search engines☆139Updated 5 months ago
- Scripts and other stuff.☆132Updated last year