18 skills found
FeeiCN / ESDEnumeration sub domains(枚举子域名)
bit4woo / TeemoA Domain Name & Email Address Collection Tool
appsecco / The Art Of Subdomain EnumerationThis repository contains all the supplement material for the book "The art of sub-domain enumeration"
appsecco / Bugcrowd Levelup Subdomain EnumerationThis repository contains all the material from the talk "Esoteric sub-domain enumeration techniques" given at Bugcrowd LevelUp 2017 virtual conference
ReddyyZ / URLBrute PyTool to brute website sub-domains and dirs.
hudacbr / D TECT# D-TECT D-TECT - Pentest the Modern Web Author: [Shawar Khan] (https://shawarkhan.com/about/) Disclaimer: I am not responsible for any damage done using this tool. This tool should only be used for educational purposes and for penetration testing. ###Compatibility: * Any platform using Python 2.7 ###Requirements: * Python 2.7 * Modules(included): Colorama, BeautifulSoup ###Description: **D-TECT** is an All-In-One Tool for Penetration Testing. This is specially programmed for Penetration Testers and Security Researchers to make their job easier, instead of launching different tools for performing different task. **D-TECT** provides multiple features and detection features which gather target information and finds different flaws in it. ###Features: * Sub-domain Scanning * Port Scanning * Wordpress Scanning * Wordpress Username Enumeration * Wordpress Backup Grabbing * Sensitive File Detection * Same-Site Scripting Scanning * Click Jacking Detection * Powerful XSS vulnerability scanning * SQL Injection vulnerability scanning * User-Friendly UI ###Usage: python d-tect.py #Screenshots: ###Menu:  ###Banner Grabbing:  ###Click Jacking Detection:  ###Port Scanner:  ###WP Backup Grabber:  ###Sensitive File Detection:  ###Cross-Site Scripting [ XSS ] Scanner:  ###SQL Injection [ SQLI ] Scanner:  ###Sub-domain Scanner:  ###WP Username Enumeration:  ###Same Site Scripting detection:  # Special Thanks To: * Curt Smith * Tayyab Qadir * Mugees Ahmad
anthophilee / SpiderFoot ادات جلب معلوماتUSES SpiderFoot can be used offensively (e.g. in a red team exercise or penetration test) for reconnaissance of your target or defensively to gather information about what you or your organisation might have exposed over the Internet. You can target the following entities in a SpiderFoot scan: IP address Domain/sub-domain name Hostname Network subnet (CIDR) ASN E-mail address Phone number Username Person's name Bitcoin address SpiderFoot's 200+ modules feed each other in a publisher/subscriber model to ensure maximum data extraction to do things like: Host/sub-domain/TLD enumeration/extraction Email address, phone number and human name extraction Bitcoin and Ethereum address extraction Check for susceptibility to sub-domain hijacking DNS zone transfers Threat intelligence and Blacklist queries API integration with SHODAN, HaveIBeenPwned, GreyNoise, AlienVault, SecurityTrails, etc. Social media account enumeration S3/Azure/Digitalocean bucket enumeration/scraping IP geo-location Web scraping, web content analysis Image, document and binary file meta data analysis Dark web searches Port scanning and banner grabbing Data breach searches So much more... INSTALLING & RUNNING To install and run SpiderFoot, you need at least Python 3.6 and a number of Python libraries which you can install with pip. We recommend you install a packaged release since master will often have bleeding edge features and modules that aren't fully tested. Stable build (packaged release): $ wget https://github.com/smicallef/spiderfoot/archive/v3.3.tar.gz $ tar zxvf v3.3.tar.gz $ cd spiderfoot ~/spiderfoot$ pip3 install -r requirements.txt ~/spiderfoot$ python3 ./sf.py -l 127.0.0.1:5001 Development build (cloning git master branch): $ git clone https://github.com/smicallef/spiderfoot.git $ cd spiderfoot $ pip3 install -r requirements.txt ~/spiderfoot$ python3 ./sf.py -l 127.0.0.1:5001 Check out the documentation and our asciinema videos for more tutorials. COMMUNITY Whether you're a contributor, user or just curious about SpiderFoot and OSINT in general, we'd love to have you join our community! SpiderFoot now has a Discord server for chat, and a Discourse server to serve as a more permanent knowledge base.
everping / SubstackSub-domains enumeration framework
DFC302 / SubseekerA sub-domain enumeration tool
tamilbotnet / Qpingqping: qping is simple python tool for finding bunch of live subdomains.Generally subdomain enumeration tools (Eg. Sublister) provide a list that consists of both Live and down subdomains. Hence the user time will be wasted to separate the live sub domains alone. So we have introduced this simple qping tool to get the live subdomains. qping read the subdomain list which is provided by subdomain enumeration tool and gives the online subdomain list separately for bug bounty.
NeverSpot / Sub4bugThis is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.
YashGoti / Recon LitAdvanced Sub-domain Enumerator
krishealty / KnockknockA Simple Tool to gather information from any website, domain, sub-domain, DNS, links by enumeration with simple commands.
hassan0x / MassForceSub-Domains Enumerations
BB-Security-Team / BBST SubdomainEnumBurp Extension from sub domain enumeration
Nawazkhan0709 / Domain And Sub Domain Enumeration ToolNo description available
M0H17 / Subdomain Takeover HelperThis script will help you to get all possible sub-domains from virustotal or enumerate using a wordlist. This will also display the CNAME, server version and status code straight on the terminal screen.
shagunattri / Rx👨💻 Sub Domain Enumeration,automation & recon tool for pentesting