Subscan is a simple tool for subdomain scanner, it can scan subdomains fast.
☆39Aug 9, 2023Updated 2 years ago
Alternatives and similar repositories for subscan
Users that are interested in subscan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This tool serves to add the kali linux repository to the ubuntu repository instantly. So that ubuntu users can install some of the tools …☆19Apr 16, 2022Updated 3 years ago
- A wacky exploitation framework written in pure python3.☆23Mar 24, 2024Updated 2 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- WEB SQLi Injection DB Dumper DATA Hacking Tool☆12Oct 1, 2019Updated 6 years ago
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆18Sep 23, 2025Updated 6 months ago
- PHP lab to test captcha bypassing☆30Jan 8, 2024Updated 2 years ago
- GitHubUserDataExtractor is a cross-platform Python tool designed to extract and display public GitHub user data both in the terminal and …☆22Sep 11, 2025Updated 6 months ago
- Perform OSINT on external targets using Shodan☆23Feb 7, 2024Updated 2 years ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Jun 3, 2023Updated 2 years ago
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- A small Go program to read /var/log/audit/audit.log☆14Nov 12, 2018Updated 7 years ago
- Tool to find stored robots.txt files from the past☆19Jun 4, 2023Updated 2 years ago
- wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]☆57Mar 26, 2022Updated 3 years ago
- ☆15May 31, 2025Updated 9 months ago
- Burp Extension for BFAC (Advanced Backup-File Artifacts Testing for Web-Applications)☆20Aug 9, 2021Updated 4 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- Another vulnerability scanner☆18Aug 9, 2025Updated 7 months ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- Linux installer stuffs☆11Aug 7, 2025Updated 7 months ago
- Windows offline filesystem hacking tool for Linux☆96Jun 24, 2022Updated 3 years ago
- 1/ An0nymousF0x-V4 2/ DorkBull 3/ JEX_V5 4/ JaguarV3 5/ Mass Bing Grab sites 6/ NekoBot 7/ PayloadV3 8/ Raiz0w0rm 9/ Vipe…☆41May 18, 2022Updated 3 years ago
- Burp suite Certificate modification tool☆18Apr 23, 2023Updated 2 years ago
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆45Jun 19, 2023Updated 2 years ago
- Automate the process of an S3 bucket subdomain takeover via dangling CNAME record☆26May 20, 2024Updated last year
- Personal blog about cyber security and challenges☆20Mar 17, 2026Updated last week
- Burp Suite plugin that adds additional checks to the passive scanner to reveal the origin IP(s) of Cloudflare-protected web applications.☆62Nov 29, 2022Updated 3 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 3 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- Uhuru OS - a Distro focused on enhancement several types of security☆42Jun 23, 2023Updated 2 years ago
- Web Vulnerability Scanner.☆13Mar 30, 2022Updated 3 years ago
- CrimeFlare is a useful tool for bypassing websites protected by CloudFlare WAF, with this tool you can easily see the real IP of websites…☆1,540Sep 1, 2023Updated 2 years ago
- This tool allows you to find ssti vulnerability with ease!☆22Sep 3, 2022Updated 3 years ago
- Compare the given environment variable value across all the processes☆16Dec 5, 2024Updated last year
- Small python script to look for common vulnerabilities on SMTP server.☆48Dec 17, 2023Updated 2 years ago
- This Tool bypass 403/401. This script contain all the possible techniques to do the bypass☆45Oct 5, 2024Updated last year
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆30Feb 27, 2026Updated 3 weeks ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆22May 15, 2022Updated 3 years ago
- Web-based GUI for TorBox☆19Jun 13, 2023Updated 2 years ago
- Simple API for storing all incoming XSS requests and various XSS templates.☆49Jul 18, 2024Updated last year