who0xac / SubHunterXLinks
**SubHunterX** is an automated tool for subdomain enumeration, vulnerability scanning, and exploitation. It discovers subdomains, detects live hosts, fuzzes directories, scans ports, identifies vulnerabilities, and automates exploitation. Ideal for penetration testers and bug bounty hunters. Comprehensive recon in one script.
☆33Updated 6 months ago
Alternatives and similar repositories for SubHunterX
Users that are interested in SubHunterX are comparing it to the libraries listed below
Sorting:
- ☆148Updated 7 months ago
- SubOwner - A Simple tool check for subdomain takeovers.☆117Updated last year
- A simple browser extension to quickly find interesting security-related information on a webpage.☆115Updated last week
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆153Updated last month
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆210Updated 2 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆263Updated this week
- GarudRecon automates domain recon with top open-source tools to discover assets, enumerate subdomains, and detect XSS, SQLi, LFI, RCE & m…☆168Updated 2 weeks ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆123Updated 10 months ago
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆151Updated last year
- ☆73Updated 4 months ago
- AI/LLM local model integration for analysis of reconftw results☆84Updated 5 months ago
- Recon MindMap (RMM)☆164Updated last year
- Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques, such as: SPF records and DNS history. By default, Unw…☆98Updated 3 months ago
- Backup Files Wordlist Generator - generate a comprehensive list of potential backup file Wordlist based on a given list URL and backup fi…☆84Updated 4 months ago
- Here are some cool and some unpublished Dorks☆79Updated 9 months ago
- This repository contains all the GF-Patterns Repositories. All we have to do is just to run the given Shell File and it's Done !!☆15Updated 4 months ago
- A passive way to find backups/ sensitive information.☆88Updated 3 months ago
- Search for sensitive data in Postman public library.☆214Updated 2 months ago
- The Most Advanced Client-Side Prototype Pollution Scanner☆239Updated last week
- Parse FFUF results in GUI with option to sort based by response code , size , keyword☆99Updated last year
- ☆156Updated last year
- GBounty is a multi-step website vulnerability scanner developed in Golang designed to help companies, pentesters, and bug hunters identif…☆148Updated 2 months ago
- CLI tool to scan URLs for suspicious keywords, extensions, paths, and hidden files.☆48Updated 5 months ago
- ☆124Updated 2 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆201Updated last month
- Advanced CORS Header Checker Tool with Vulnerability Detection and Bypass Attempts☆65Updated 4 months ago
- This tool will check for Sensitive Data Leakage with some useful patterns/RegEx. The patterns are mostly targeted on waybackdata and filt…☆229Updated 5 months ago
- CLI tool for fetching URLs from Wayback Machine, Common Crawl, and VirusTotal.☆38Updated 2 months ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆129Updated last year
- A Go-based utility that processes input through multiple AI models concurrently (OpenAI, Claude, and Gemini) and provides a summarized co…☆86Updated 4 months ago