All Projects → DeadDNS → Similar Projects or Alternatives

312 Open source projects that are alternatives of or similar to DeadDNS

SuperLibrary
Information Security Library
Stars: ✭ 60 (+36.36%)
Mutual labels:  bugbounty
shania
Scan secrets from Continuous Integration Build Logs
Stars: ✭ 54 (+22.73%)
Mutual labels:  bugbounty
py-scripts-other
A collection of some of my scripts
Stars: ✭ 79 (+79.55%)
Mutual labels:  bugbounty
apkizer
apkizer is a mass downloader for android applications for all available versions.
Stars: ✭ 40 (-9.09%)
Mutual labels:  bugbounty
Cc.py
Extracting URLs of a specific target based on the results of "commoncrawl.org"
Stars: ✭ 250 (+468.18%)
Mutual labels:  bugbounty
security-policy-specification-standard
This document proposes a way of standardising the structure, language, and grammar used in security policies.
Stars: ✭ 24 (-45.45%)
Mutual labels:  bugbounty
Autorecon
Simple shell script for automated domain recognition with some tools
Stars: ✭ 244 (+454.55%)
Mutual labels:  bugbounty
Inventus
Inventus is a spider designed to find subdomains of a specific domain by crawling it and any subdomains it discovers.
Stars: ✭ 80 (+81.82%)
Mutual labels:  bugbounty
fdnssearch
Swiftly search FDNS datasets from Rapid7 Open Data
Stars: ✭ 19 (-56.82%)
Mutual labels:  bugbounty
Keywords
Stars: ✭ 226 (+413.64%)
Mutual labels:  bugbounty
KaliIntelligenceSuite
Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing standard penetration testing tools. The collected data is internally stored in a structured manner to allow the fast identification and visualisation of the collected information.
Stars: ✭ 58 (+31.82%)
Mutual labels:  bugbounty
Bucket-Flaws
Bucket Flaws ( S3 Bucket Mass Scanner ): A Simple Lightweight Script to Check for Common S3 Bucket Misconfigurations
Stars: ✭ 43 (-2.27%)
Mutual labels:  bugbounty
Mobilehackersweapons
Mobile Hacker's Weapons / A collection of cool tools used by Mobile hackers. Happy hacking , Happy bug-hunting
Stars: ✭ 170 (+286.36%)
Mutual labels:  bugbounty
Contact.sh
An OSINT tool to find contacts in order to report security vulnerabilities.
Stars: ✭ 216 (+390.91%)
Mutual labels:  bugbounty
Jira-Lens
Fast and customizable vulnerability scanner For JIRA written in Python
Stars: ✭ 185 (+320.45%)
Mutual labels:  bugbounty
Can I Take Over Xyz
"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
Stars: ✭ 2,808 (+6281.82%)
Mutual labels:  bugbounty
project-black
Pentest/BugBounty progress control with scanning modules
Stars: ✭ 279 (+534.09%)
Mutual labels:  bugbounty
Wstg
The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.
Stars: ✭ 3,873 (+8702.27%)
Mutual labels:  bugbounty
Awesome-HTTPRequestSmuggling
A curated list of awesome blogs and tools about HTTP request smuggling attacks. Feel free to contribute! 🍻
Stars: ✭ 97 (+120.45%)
Mutual labels:  bugbounty
Qsfuzz
qsfuzz (Query String Fuzz) allows you to build your own rules to fuzz query strings and easily identify vulnerabilities.
Stars: ✭ 201 (+356.82%)
Mutual labels:  bugbounty
gosint
Gosint is a distributed asset information collection and vulnerability scanning platform
Stars: ✭ 344 (+681.82%)
Mutual labels:  bugbounty
Bountystrike Sh
Poor (rich?) man's bug bounty pipeline
Stars: ✭ 168 (+281.82%)
Mutual labels:  bugbounty
Slicer
A tool to automate the boring process of APK recon
Stars: ✭ 199 (+352.27%)
Mutual labels:  bugbounty
rejig
Turn your VPS into an attack box
Stars: ✭ 33 (-25%)
Mutual labels:  bugbounty
Redteam Hardware Toolkit
🔺 Red Team Hardware Toolkit 🔺
Stars: ✭ 163 (+270.45%)
Mutual labels:  bugbounty
Getjs
A tool to fastly get all javascript sources/files
Stars: ✭ 190 (+331.82%)
Mutual labels:  bugbounty
flydns
Related subdomains finder
Stars: ✭ 29 (-34.09%)
Mutual labels:  bugbounty
CommandGenInterface
Simple vueJS based command generator which I developed in order to learn vueJS a little bit more.
Stars: ✭ 17 (-61.36%)
Mutual labels:  bugbounty
gf-patterns
Collection grep patterns for Tom Hudson a.k.a Tomnomnom tools namely gf
Stars: ✭ 27 (-38.64%)
Mutual labels:  bugbounty
WhoEnum
Mass querying whois records
Stars: ✭ 24 (-45.45%)
Mutual labels:  bugbounty
ras-fuzzer
RAS(RAndom Subdomain) Fuzzer
Stars: ✭ 42 (-4.55%)
Mutual labels:  bugbounty
Jira Scan
CVE-2017-9506 - SSRF
Stars: ✭ 159 (+261.36%)
Mutual labels:  bugbounty
Crithit
Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (+313.64%)
Mutual labels:  bugbounty
Bugs-feed
Bug's feed is a local hosted portal where you can search for the latest news, videos, CVEs, vulnerabilities...
Stars: ✭ 90 (+104.55%)
Mutual labels:  bugbounty
Xrcross
XRCross is a Reconstruction, Scanner, and a tool for penetration / BugBounty testing. This tool was built to test (XSS|SSRF|CORS|SSTI|IDOR|RCE|LFI|SQLI) vulnerabilities
Stars: ✭ 175 (+297.73%)
Mutual labels:  bugbounty
allsafe
Intentionally vulnerable Android application.
Stars: ✭ 135 (+206.82%)
Mutual labels:  bugbounty
Taie Bugbounty Killer
挖掘国内外漏洞平台必备的自动化捡钱赏金技巧,看了并去做了捡钱如喝水。
Stars: ✭ 175 (+297.73%)
Mutual labels:  bugbounty
xssfinder
Toolset for detecting reflected xss in websites
Stars: ✭ 105 (+138.64%)
Mutual labels:  bugbounty
Jaeles Signatures
Default signature for Jaeles Scanner
Stars: ✭ 172 (+290.91%)
Mutual labels:  bugbounty
Jasmin-Ransomware
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (+90.91%)
Mutual labels:  bugbounty
Tools Tbhm
Tools of "The Bug Hunters Methodology V2 by @jhaddix"
Stars: ✭ 171 (+288.64%)
Mutual labels:  bugbounty
tugarecon
Pentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (+222.73%)
Mutual labels:  bugbounty
Bbrecon
Python library and CLI for the Bug Bounty Recon API
Stars: ✭ 169 (+284.09%)
Mutual labels:  bugbounty
ShadowClone
Unleash the power of cloud
Stars: ✭ 224 (+409.09%)
Mutual labels:  bugbounty
Asnlookup
Leverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
Stars: ✭ 163 (+270.45%)
Mutual labels:  bugbounty
gradejs
GradeJS analyzes production Webpack bundles without having access to the source code of a website. Instantly see vulnerabilities, outdated packages, and more just by entering a web application URL.
Stars: ✭ 362 (+722.73%)
Mutual labels:  bugbounty
Minesweeper
A Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 23000 malicious cryptocurrency mining domains (cryptojacking).
Stars: ✭ 162 (+268.18%)
Mutual labels:  bugbounty
Rescope
Rescope is a tool geared towards pentesters and bugbounty researchers, that aims to make life easier when defining scopes for Burp Suite and OWASP ZAP.
Stars: ✭ 156 (+254.55%)
Mutual labels:  bugbounty
fleex
Fleex makes it easy to create multiple VPS on cloud providers and use them to distribute workloads.
Stars: ✭ 181 (+311.36%)
Mutual labels:  bugbounty
Di.we.h
Repositório com conteúdo sobre web hacking em português
Stars: ✭ 156 (+254.55%)
Mutual labels:  bugbounty
dontgo403
Tool to bypass 40X response codes.
Stars: ✭ 457 (+938.64%)
Mutual labels:  bugbounty
Sudomy
Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Stars: ✭ 1,572 (+3472.73%)
Mutual labels:  bugbounty
Apkleaks
Scanning APK file for URIs, endpoints & secrets.
Stars: ✭ 2,707 (+6052.27%)
Mutual labels:  bugbounty
Ssti Payloads
🎯 Server Side Template Injection Payloads
Stars: ✭ 150 (+240.91%)
Mutual labels:  bugbounty
vaf
Vaf is a cross-platform very advanced and fast web fuzzer written in nim
Stars: ✭ 294 (+568.18%)
Mutual labels:  bugbounty
Xss Payload List
🎯 Cross Site Scripting ( XSS ) Vulnerability Payload List
Stars: ✭ 2,617 (+5847.73%)
Mutual labels:  bugbounty
Proof Of Concepts
A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.
Stars: ✭ 148 (+236.36%)
Mutual labels:  bugbounty
Sub-Drill
A very (very) FAST and simple subdomain finder based on online & free services. Without any configuration requirements.
Stars: ✭ 70 (+59.09%)
Mutual labels:  bugbounty
PayloadsAll
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 31 (-29.55%)
Mutual labels:  bugbounty
ScanApi
Subdomains-enumeration, subdomain-takeover monitoring api and S3 bucket scanner.
Stars: ✭ 34 (-22.73%)
Mutual labels:  bugbounty
61-120 of 312 similar projects