subzy
Vulnerability scanner
Automates subdomain takeover vulnerability checks
Subdomain takeover vulnerability checker
1k stars
22 watching
156 forks
Language: Go
last commit: 2 months ago bugbountycybersecuritysecurity-researchsecurity-vulnerabilitysubdomain-takeover
Related projects:
Repository | Description | Stars |
---|---|---|
ice3man543/subover | A tool for detecting potential subdomain takeovers in web services | 931 |
antichown/subdomain-takeover | An automated tool to identify subdomain vulnerabilities in web applications | 353 |
1n3/sn1per | Automates vulnerability scanning and discovery across an organization's entire attack surface | 8,140 |
saadahmedx/subdomain-takeover | A tool to quickly identify if a subdomain is vulnerable to takeover by scanning target domains | 57 |
m8sec/subscraper | A subdomain enumeration tool used to identify potential vulnerabilities in online services | 822 |
cert-polska/artemis | A modular vulnerability scanner with automatic report generation capabilities. | 560 |
macmod/stars | Identifies potential subdomain takeover issues in cloud DNS environments | 49 |
thebinitghimire/nthim | A tool to detect sub-domain takeovers by scanning targets and checking DNS information. | 355 |
skynet0x01/tugarecon | A tool designed to collect and gather subdomains for penetration testing and bug hunting. | 153 |
gmatuz/inthewilddb | A comprehensive database of vulnerability and exploitation reports | 245 |
r0075h3ll/oralyzer | A tool to identify vulnerabilities in web applications by probing for Open Redirections and other types of attacks. | 753 |
autistic-symposium/sec-pentesting-toolkit | A comprehensive collection of security resources and tools for pentesting and reverse engineering | 162 |
industrialarmy/hello_proto | Tools for discovering vulnerabilities in industrial control systems through network scanning and protocol exploitation | 9 |
nexxai/substr3am | Tools to enumerate subdomains by monitoring SSL certificate issuance | 66 |
secdec/attack-surface-detector-burp | Identifies web app endpoints and parameters to help detect vulnerabilities | 98 |