burp-scope-monitor: Burp Suite Extension to monitor new scope
Burp Scope Monitor Extension A Burp Suite Extension to monitor and keep track of tested endpoints. Main Features Simple, easy way to keep track of unique endpoints when testing an...
Burp Scope Monitor Extension A Burp Suite Extension to monitor and keep track of tested endpoints. Main Features Simple, easy way to keep track of unique endpoints when testing an...
recce It was my personal script that I have been using during my recon in bug bounties that check the status of domain whether they are alive or not. It...
Crypto / Reverse Engineering / Sniffing & Spoofing / Social Engineering / Web Information Gathering / Web Vulnerability Analysis
by do son · Published August 20, 2019 · Last modified October 10, 2021
REBEL-FRAMEWORK Advanced and easy to use penetration testing framework Module├ ├ net/iface ➤ Interface info. ├ net/map ➤ Hosts live Scan in LAN. ├ net/scan ➤ Scan [Ports, OS, Etc]...
Buster is an advanced OSINT tool used to: Get social accounts of an email using multiple sources(gravatar,about.me, myspace, skype,github,linkedin, previous breaches) Get links to where the email was found using...
Sublert is a security and reconnaissance tool that was written in Python to leverage certificate transparency for the sole purpose of monitoring new subdomains deployed by specific organizations and issued...
mpDNS aka multi-purpose DNS Server DNS Server with multiple useful features Should work on Python 2 and 3 names.db -> holds all custom records (see examples) Simple wildcards like *.example.com...
twint Twint is an advanced Twitter scraping tool written in python that allows for scraping Tweets and pictures from Twitter profiles without using Twitter’s API. Twint utilizes Twitter’s search operators to let you...
Information Gathering / Vulnerability Analysis / Web Information Gathering / Web Vulnerability Analysis
by do son · Published August 10, 2019 · Last modified September 28, 2024
nmap (“Network Mapper“) is an open-source tool for network exploration and security auditing. It was designed to rapidly scan large networks, although it works fine to scan single hosts. nmap...
Attack Surface Mapper Attack Surface Mapper is a reconnaissance tool that uses a mixture of open-source intelligence and active techniques to expand the attack surface of your target. You feed...
Information Gathering / Web Information Gathering
by do son · Published August 6, 2019 · Last modified August 27, 2021
FOCA FOCA (Fingerprinting Organizations with Collected Archives) is a tool used mainly to find metadata and hidden information in the documents its scans. These documents may be on web pages...
Subzy Subdomain takeover tool which works based on matching response fingerprints from can-i-take-over-xyz Installation git clone https://github.com/LukaSikic/subzy Use An only required flag is either –target or –targets –target (string) – Set single or multiple...
The OWASP Amass tool suite obtains subdomain names by scraping data sources, recursive brute forcing, crawling web archives, permuting/altering names, and reverse DNS sweeping. Additionally, Amass uses the IP addresses...
GCPBucketBrute A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated. This script (optionally) accepts GCP user/service account...
CrossLinked LinkedIn enumeration tool to extract valid employee names from an organization through search engine scraping. Names can be formatted in a defined naming convention for further security testing. CrossLinked...
Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of the...