Subscan is a simple tool for subdomain scanner, it can scan subdomains fast.
☆40Aug 9, 2023Updated 2 years ago
Alternatives and similar repositories for subscan
Users that are interested in subscan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This tool serves to add the kali linux repository to the ubuntu repository instantly. So that ubuntu users can install some of the tools …☆19Apr 16, 2022Updated 4 years ago
- A wacky exploitation framework written in pure python3.☆23Mar 24, 2024Updated 2 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 4 years ago
- WEB SQLi Injection DB Dumper DATA Hacking Tool☆13Oct 1, 2019Updated 6 years ago
- PHP lab to test captcha bypassing☆30Jan 8, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- GitHubUserDataExtractor is a cross-platform Python tool designed to extract and display public GitHub user data both in the terminal and …☆22Mar 26, 2026Updated last month
- Perform OSINT on external targets using Shodan☆24Feb 7, 2024Updated 2 years ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Jun 3, 2023Updated 2 years ago
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- A small Go program to read /var/log/audit/audit.log☆14Nov 12, 2018Updated 7 years ago
- Tool to find stored robots.txt files from the past☆19Jun 4, 2023Updated 2 years ago
- wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]☆57Mar 26, 2022Updated 4 years ago
- ☆16May 31, 2025Updated 11 months ago
- Burp Extension for BFAC (Advanced Backup-File Artifacts Testing for Web-Applications)☆20Aug 9, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Another vulnerability scanner☆18Aug 9, 2025Updated 8 months ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- Linux installer stuffs☆11Aug 7, 2025Updated 8 months ago
- Windows offline filesystem hacking tool for Linux☆96Jun 24, 2022Updated 3 years ago
- Automate the process of an S3 bucket subdomain takeover via dangling CNAME record☆26May 20, 2024Updated last year
- Personal blog about cyber security and challenges☆20Mar 25, 2026Updated last month
- Burp Suite plugin that adds additional checks to the passive scanner to reveal the origin IP(s) of Cloudflare-protected web applications.☆63Nov 29, 2022Updated 3 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 4 years ago
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆47Jun 19, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- Uhuru OS - a Distro focused on enhancement several types of security☆42Jun 23, 2023Updated 2 years ago
- Web Vulnerability Scanner.☆13Mar 30, 2022Updated 4 years ago
- CrimeFlare is a useful tool for bypassing websites protected by CloudFlare WAF, with this tool you can easily see the real IP of websites…☆1,557Sep 1, 2023Updated 2 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆48Dec 17, 2023Updated 2 years ago
- This Tool bypass 403/401. This script contain all the possible techniques to do the bypass☆45Oct 5, 2024Updated last year
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆30Feb 27, 2026Updated 2 months ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆22May 15, 2022Updated 3 years ago
- Web-based GUI for TorBox☆19Jun 13, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Open Redirect Vulnerability Payload List☆10Feb 23, 2021Updated 5 years ago
- Simple API for storing all incoming XSS requests and various XSS templates.☆49Jul 18, 2024Updated last year
- Automated Recon Tool Installer☆16Jun 29, 2022Updated 3 years ago
- The long shadow to emerge as other Git repositories☆18Feb 25, 2026Updated 2 months ago
- proxy-me is a tool to grab or scrape proxies across internet under specific protocols, It is a lightweight project that hourly scrapes lo…☆11Apr 9, 2023Updated 3 years ago
- Compilation of commands for hacking tasks and security tools as a bit of everything☆15Apr 23, 2026Updated last week
- A vast collection of security tools and resources curated by the community.☆216Jun 11, 2025Updated 10 months ago