bbot
Recon tool
Automates reconnaissance and vulnerability scanning of internet targets
The recursive internet scanner for hackers. 🧡
7k stars
59 watching
557 forks
Language: Python
last commit: 2 months ago
Linked from 1 awesome list
asmattack-surface-managementautomationbugbountyclieasmhackingneo4josintosint-frameworkpentestingpythonreconrecursionscannersubdomain-enumerationsubdomain-scannersubdomainsthreat-intelligencethreatintel
Related projects:
Repository | Description | Stars |
---|---|---|
| Tools for gathering information about and exploiting vulnerabilities in domains | 620 |
| A tool for automating the discovery of subdomains and DNS records by using open resolvers as a proxy to circumvent rate limiting. | 3,372 |
| A tool designed to automate the process of discovering subdomains from a given domain name | 9,947 |
| A tool for brute-forcing domain names by sending DNS queries asynchronously | 648 |
| A high-performance tool for reconnaissance and vulnerability scanning of web applications and networks | 3,105 |
| A plugin for Burpsuite to detect malicious cryptocurrency mining scripts in web pages | 198 |
| A tool for automatically discovering subdomains of given domains | 3,502 |
| A tool designed to collect and gather subdomains for penetration testing and bug hunting. | 153 |
| A tool used during reconnaissance to gather information on a domain's external threat landscape by scraping data from various public resources | 11,612 |
| Automates penetration testing tasks including recon, scanning, enumeration, and payload creation using Metasploit. | 3,454 |
| Tools to generate and detect unicode domains for phishing attacks using python | 1,147 |
| Automatically scans endpoints for potential SQL Truncation vulnerabilities by fuzzing request parameters | 62 |
| An APT report collection and threat intelligence repository with Python implementations of various attacks and malware examples. | 2,464 |
| An open-source project that explores the intersection of machine learning and security to develop tools for detecting vulnerabilities in web applications. | 1,987 |
| Automates information gathering and analysis from various data sources to support threat intelligence and cybersecurity efforts | 13,364 |