subdomains.sh wrapper around tools I use for subdomain enumeration, to automate the workflow, on a given domain. Usage To display …
Osmedeus – A Workflow Engine For Offensive Security
A Workflow Engine For Offensive Security Installation NOTE that you need some essential tools like curl, wget, git, zip and …
SQLRecon – A C# MS SQL Toolkit Designed For Offensive Reconnaissance And Post-Exploitation
A C# MS-SQL toolkit designed for offensive reconnaissance and post-exploitation. For detailed usage information on each technique, refer to the …
Second-Order – Subdomain Takeover Scanner
Scans web applications for second-order subdomain takeover by crawling the app, and collecting URLs (and other data) that match certain …
ShonyDanza – A Customizable, Easy-To-Navigate Tool For Researching, Pen Testing, And Defending With The Power Of Shodan
A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan. With ShonyDanza, you can: Obtain …
TeamsUserEnum – User Enumeration With Microsoft Teams API
Sometimes user enumeration could be sometimes useful during the reconnaissance of an assessment. This tool will determine if an email …
Nebula – Cloud C2 Framework, Which At The Moment Offers Reconnaissance, Enumeration, Exploitation, Post Exploitation On AWS
Nebula is a Cloud and (hopefully) DevOps Penetration Testing framework. It is build with modules for each provider and each …
CertEagle – Asset monitoring utility using real time CT log feeds
In Bugbounties “If you are not first , then you are last” there is no such thing as silver or …
BugBountyScanner – A Bash Script And Docker Image For Bug Bounty Reconnaissance
A Bash script and Docker image for Bug Bounty reconnaissance, intended for headless use. Low on resources, high on information …
Sigurlx – A Web Application Attack Surface Mapping Tool
endpoint > js …” name=”twitter:description”> endpoint > js …” name=”description”> endpoint > js …” property=”og:description”> sigurlx a web application attack …